Abstract
This paper presents the cryptanalysis on a method that uses the visual cryptography and feature extraction for watermarking in images. Many of the existing digital watermarking techniques use a method which does not involve embedding of the watermark into the vulnerable images, but rather it only uses the features of image as the security key for generating watermark. This is assisted with the visual cryptography which makes it possible to perform watermarking without embedding any data onto it. Although they perform very well with many different attacks like scaling, rotating, compression, different kind of noises, etc., it still fails to prove the copyrights of image when the attack as illustrated in the paper is applied to the watermarked image. This method allows the attacker to use his own valid watermark to be introduced to the image, which will result in failure of the owner to prove its copyright.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naor, M., Shamir, A.: Visual cryptography. In: Proceedings of the Advances Cryptology. EUROCRYPT94. LNCS, vol. 950, pp. 1–12. Springer-Verlag, Berlin (1995)
Hsu, C.S., Hou, Y.C.: Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt. Eng. 44(7), 077003–077010 (2005). https://doi.org/10.1117/1.1951647
Hwang, R.J.: A digital image copyright protection scheme based on visual cryptography. Tamkang J. Sci. Eng. 3(2), 97–106 (2000)
Rawat, S., Raman, B.: A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion. Elsevier AEU 66(11), 955–962 (2012). https://doi.org/10.1016/j.aeue.2012.04.004
Pushpa Devi, B., et al.: A watermarking scheme for digital images based on visual cryptography. Contemp. Eng. Sci. 8(32), 1517–1528 (2015)
Fridrich, J., et al.: Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique. SUNY Binghamton, Binghamton, NY
Caragat, D., et al.: Cryptanalysis of an improved fragile watermarking scheme. AEU-Int. J. Electron. Commun. (2016)
Abusitta, A.H.: A visual cryptography based digital image copyright protection. J. Inf. Secur. 3, 96–104 (2012)
Hassan, M.A., Khalili, M.A.: Self watermarking based on visual cryptography. World Acad. Sci. Eng. Technol. 8 (2005)
Surekha, B.: A multiple watermarking technique for images based on visual cryptography. Int. J. Comput. Appl. (0975–8887) 1(11) (2010)
Shao, Z.: Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process. Image Commun. 48, 12–21 (2016)
Datta, S., Nath, A.: Data authentication using digital watermarking. Int. J. Adv. Res. Comput. Sci. Manag. Stud. 2(12) (2014)
Saturwar, J., Chaudhari, D.N.: Digital watermarking scheme for secret images using visual cryptography. Int. J. Sci. Eng. Res. 4(6) (2013). ISSN 2229-5518
Acknowledgements
This work is supported by CSED MNNIT Allahabad, Allahabad.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shashni, N., Ranvijay, Yadav, M. (2019). Cryptanalysis on Digital Image Watermarking Based on Feature Extraction and Visual Cryptography. In: Pati, B., Panigrahi, C., Misra, S., Pujari, A., Bakshi, S. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 713. Springer, Singapore. https://doi.org/10.1007/978-981-13-1708-8_39
Download citation
DOI: https://doi.org/10.1007/978-981-13-1708-8_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1707-1
Online ISBN: 978-981-13-1708-8
eBook Packages: EngineeringEngineering (R0)