Multiple Watermarking in Visual Cryptography

  • Hao Luo
  • Zhe-Ming Lu
  • Jeng-Shyang Pan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5041)


This paper proposes a scheme to hide two watermarks in visual secret sharing of a gray level image. One watermark is embedded during secret image halftoning, and the other is hidden during the halftone image encryption. A non-expansion visual secret sharing model is used to encrypt the halftone image. In watermark extraction, only Exclusive-OR operation is needed, and basic properties of conventional visual cryptography technique are still preserved. Experimental results show the effectiveness of our schemes.


Image Encryption Secret Image Pseudo Random Number Generator Watermark Embedding Decryption Strategy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  2. 2.
    Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. on Image Processing 15(8), 2441–2453 (2006)CrossRefGoogle Scholar
  3. 3.
    Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters 24, 349–358 (2003)CrossRefzbMATHGoogle Scholar
  4. 4.
    Blundo, C., Santis, A.D., Naor, M.: Visual cryptography for grey level images. Information Processing Letters 75(6), 255–259 (2000)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive Color Visual Cryptography. Journal of Electronic Imaging 14(3) (2005)Google Scholar
  6. 6.
    Hou, Y.C.: Visual cryptography for color image. Pattern Recognition 36(7), 1619–1629 (2003)CrossRefGoogle Scholar
  7. 7.
    Chang, C.-C., Yu, T.-X.: Sharing a secret gray image in multiple images. In: IEEE Proceedings of the First International Symposium on Cyber Worlds, pp. 230–237 (2002)Google Scholar
  8. 8.
    Lukac, R., Plataniotis, K.N.: Colour Image Secret Sharing. IEE Electronics Letters 40(9), 529–530 (2004)CrossRefGoogle Scholar
  9. 9.
    Pan, J.S., Huang, H.C., Jain, L.C.: Intelligent Watermarking Techniques. World Scientific Publishing Company, Singapore (2004)CrossRefzbMATHGoogle Scholar
  10. 10.
    Fang, W.P., Lin, J.C.: Visual Cryptography with Extra Ability of Hiding Confidential Data. Journal of Electronic Imaging 15(2) (2006)Google Scholar
  11. 11.
    Ito, R., Kuwakado, H., Tanka, H.: Image size invariant visual cryptography. IEICE Trans. Fundamentals E82-A(10), 2172–2177 (1999)Google Scholar
  12. 12.
    Floyd, R., Steinberg, L.: An adaptive algorithm for spatial gray scale. SID. Int. Symp. Dig. Tech. Papers, 36-37 (1975)Google Scholar
  13. 13.
    Jarvis, J.F., Judice, C.N., Ninke, W.H.: A survey of techniques for the display of continuous-tone pictures on bilevel displays. Computer Graphics Image Process 5, 13–40 (1976)CrossRefGoogle Scholar
  14. 14.
    Stucki, P.: MECCA - A multiple error correcting computation algorithm for bilevel image hardcopy reproduction, Research Report RZ1060, IBM Res. Lab., Zurich, Switzerland (1981)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Hao Luo
    • 1
  • Zhe-Ming Lu
    • 2
  • Jeng-Shyang Pan
    • 3
  1. 1.Harbin Institute of TechnologyHarbinP.R. China
  2. 2.Sun Yat-sen UniversityGuangzhouP.R. China
  3. 3.Kaohsiung University of Applied SciencesKaohsiungTaiwan

Personalised recommendations