Abstract
This paper proposes a model and algorithm for digital watermarking using visual cryptographic techniques. Initially the visual cryptographic techniques scrambled the secret information into pixelated form, this pixelated secret share does not reveal any key information. This pixelated secret shares are again embedded into invisible digital watermarking with separate covering image for each and every shares. A model and an Algorithm has been proposed based on this techniques, the result has been evaluated and the metrics also calculated. Moreover, our scheme shows better security features compared to the existing techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology—EUROCRYPT 1994, Perugia. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1995)
Naor, M., Pinkas, B.: Visual authentication and identification. Adv. Cryptol. 1294, 322–336 (1997)
Hwang, R.: A digital image copyright protection scheme based on visual cryptography. Tamkang J. Sci. Eng. 3(2), 97–106 (2000)
Tai, S.C., Wang, C.C., Yu, C.S.: Repeating image watermarking technique by visual cryptography. In: IEICE Transaction Fundamentals, vol. E83-A, No. 8, pp. 1589–1598 (2000)
Wu, D.-C., Tsai, W.-H.: A stenographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24(9–10), 1613–1626 (2003)
Fu, M.S., Au, O.C.: Joint visual cryptography and watermarking. In: Proceedings of the IEEE International Conference on Multimedia Expo, pp. 975–978 (2004)
Hassan, M.A., Khalili, M.A.: Self-watermarking based on visual cryptography. World Acad. Sci. Eng. Technol. 8, 159–162 (2005)
Wang, F.-H., Pan, J.-S., Jain, L.C.: Digital watermarking techniques. Stud. Comput. Intell. 232, 11–26 (2009)
Singh, K.M.: Dual watermarking scheme for copyright protection. Int. J. Comput. Sci. Eng. Surv. 3, 99–106 (2009)
Punitha, S., Thompson, S., Siva rama lingam, N.: Binary watermarking techniques based on visual cryptography. In: IEEE International Conference on Communication Control and Computing Technologies (ICCCCT) (2010)
Padhmavati, B., Nirmal Kumar, P., Dorai Rangaswamy, M.A.: A novel scheme for mutual authentication and cheating prevention in visual cryptography using image processing. In: Proceeding of International Conference on Advances in Computer science (2010)
Savu, L.: Cryptography role in information security. In: Recent Researches in Communications and IT, pp. 36–41 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Chitra, K., Prasanna Venkatesan, V. (2020). A Dynamic Security Model for Visual Cryptography and Digital Watermarking. In: Pandian, A.P., Senjyu, T., Islam, S.M.S., Wang, H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_42
Download citation
DOI: https://doi.org/10.1007/978-3-030-24643-3_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24642-6
Online ISBN: 978-3-030-24643-3
eBook Packages: EngineeringEngineering (R0)