Advertisement

Cryptanalysis on Digital Image Watermarking Based on Feature Extraction and Visual Cryptography

  • Neha ShashniEmail author
  • Ranvijay
  • Mainejar Yadav
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 713)

Abstract

This paper presents the cryptanalysis on a method that uses the visual cryptography and feature extraction for watermarking in images. Many of the existing digital watermarking techniques use a method which does not involve embedding of the watermark into the vulnerable images, but rather it only uses the features of image as the security key for generating watermark. This is assisted with the visual cryptography which makes it possible to perform watermarking without embedding any data onto it. Although they perform very well with many different attacks like scaling, rotating, compression, different kind of noises, etc., it still fails to prove the copyrights of image when the attack as illustrated in the paper is applied to the watermarked image. This method allows the attacker to use his own valid watermark to be introduced to the image, which will result in failure of the owner to prove its copyright.

Keywords

Cryptanalysis Digital watermarking Feature extraction Visual cryptography 

Notes

Acknowledgements

This work is supported by CSED MNNIT Allahabad, Allahabad.

References

  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: Proceedings of the Advances Cryptology. EUROCRYPT94. LNCS, vol. 950, pp. 1–12. Springer-Verlag, Berlin (1995)Google Scholar
  2. 2.
    Hsu, C.S., Hou, Y.C.: Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt. Eng. 44(7), 077003–077010 (2005).  https://doi.org/10.1117/1.1951647CrossRefGoogle Scholar
  3. 3.
    Hwang, R.J.: A digital image copyright protection scheme based on visual cryptography. Tamkang J. Sci. Eng. 3(2), 97–106 (2000)Google Scholar
  4. 4.
    Rawat, S., Raman, B.: A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion. Elsevier AEU 66(11), 955–962 (2012).  https://doi.org/10.1016/j.aeue.2012.04.004CrossRefGoogle Scholar
  5. 5.
    Pushpa Devi, B., et al.: A watermarking scheme for digital images based on visual cryptography. Contemp. Eng. Sci. 8(32), 1517–1528 (2015)CrossRefGoogle Scholar
  6. 6.
    Fridrich, J., et al.: Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique. SUNY Binghamton, Binghamton, NYGoogle Scholar
  7. 7.
    Caragat, D., et al.: Cryptanalysis of an improved fragile watermarking scheme. AEU-Int. J. Electron. Commun. (2016)Google Scholar
  8. 8.
    Abusitta, A.H.: A visual cryptography based digital image copyright protection. J. Inf. Secur. 3, 96–104 (2012)Google Scholar
  9. 9.
    Hassan, M.A., Khalili, M.A.: Self watermarking based on visual cryptography. World Acad. Sci. Eng. Technol. 8 (2005)Google Scholar
  10. 10.
    Surekha, B.: A multiple watermarking technique for images based on visual cryptography. Int. J. Comput. Appl. (0975–8887) 1(11) (2010)CrossRefGoogle Scholar
  11. 11.
    Shao, Z.: Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process. Image Commun. 48, 12–21 (2016)Google Scholar
  12. 12.
    Datta, S., Nath, A.: Data authentication using digital watermarking. Int. J. Adv. Res. Comput. Sci. Manag. Stud. 2(12) (2014)Google Scholar
  13. 13.
    Saturwar, J., Chaudhari, D.N.: Digital watermarking scheme for secret images using visual cryptography. Int. J. Sci. Eng. Res. 4(6) (2013). ISSN 2229-5518Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Computer Science Engineering DepartmentMNNIT AllahabadAllahabadIndia

Personalised recommendations