10
Views
21
CrossRef citations to date
0
Altmetric
Original Articles

A colour image copyright protection scheme based on visual cryptography and discrete cosine transform

, &
Pages 133-140 | Received 23 Jul 2001, Accepted 04 Apr 2002, Published online: 06 Oct 2016

REFERENCES

  • Bors, A. G. and Pitas, I. Image watermarking using DCT domain constraints. In Proceedings of 1996 IEEE International Conference on Image Processing (CICIP'96), Vol. 3, September 1996, pp. 231–234.
  • Chang, C. C., Hwang, K. F. and Hwang, M. S. A watermarking technique based on one-way hash functions. IEEE Trans. Consumer Electronics, May 1999, 45(2), 286–294.
  • Chang, C. C, Hwang, K. F. and Hwang, M. S. A block based digital watermark for copy protection of images. In Proceedings of APCC/OECC'99, Beijing, Vol. 2, October 1999, pp. 977–980.
  • Craver, S., Memon, N., Yeo, B. L. and Yeung, M. M. Resolving ownerships with invisible watermarking technique: limitations, attacks, and implication. In IEEE J. Selected Areas in Communs, 1998, 16(4), 573–586.
  • Hsu, C. T. and Wu, J. L. Hidden digital watermarks in images. IEEE Trans. Image Processing, January 1999, 8(1), 58–68.
  • Kutter, M., Jordan, F. and Bossen, F. Digital watermarking of color images using amplitude modulation. J. Electronic Imaging, April 1998, 7(2), 326–332.
  • Voyatzis, G. and Pitas, I. Protection digital image copyrights: a framework. IEEE Computer Graphics and Applies, 1999, 1, 18–24.
  • Rao, K. R. and Yip, P. Discrete Cosine Transform—Algorithms, Advantages, Applications, 1990 (Academic Press, New York).
  • Blundo, C., De Santis, A. and Naor, M. Visual cryptography for grey level images. Inf. Processing Lett., May 2000, 75(6), 255–259.
  • Naor, N. and Shamir, A. Visual cryptography. In Advances in Cryptography: Eurocryp'94, 1995, pp. 1–12 (Springer-Verlag, Berlin).
  • Kohda, T., Ookubo, Y. and Ishii, K. A color image communication using YIQ signals by spread spectrum techniques. In Proceedings of 1998 IEEE 5th International Symposium on Spread Spectrum Techniques and Applications, Vol. 3, September 1998, pp. 743–747.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.