Open Access   Article Go Back

Enhancing Visual Cryptography Using Digital Watermarking

Shobha Elizabeth Rajan1 , Sreedevi P2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-7 , Page no. 152-156, Jul-2015

Online published on Jul 30, 2015

Copyright © Shobha Elizabeth Rajan, Sreedevi P . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shobha Elizabeth Rajan, Sreedevi P, “Enhancing Visual Cryptography Using Digital Watermarking,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.152-156, 2015.

MLA Style Citation: Shobha Elizabeth Rajan, Sreedevi P "Enhancing Visual Cryptography Using Digital Watermarking." International Journal of Computer Sciences and Engineering 3.7 (2015): 152-156.

APA Style Citation: Shobha Elizabeth Rajan, Sreedevi P, (2015). Enhancing Visual Cryptography Using Digital Watermarking. International Journal of Computer Sciences and Engineering, 3(7), 152-156.

BibTex Style Citation:
@article{Rajan_2015,
author = {Shobha Elizabeth Rajan, Sreedevi P},
title = {Enhancing Visual Cryptography Using Digital Watermarking},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2015},
volume = {3},
Issue = {7},
month = {7},
year = {2015},
issn = {2347-2693},
pages = {152-156},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=592},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=592
TI - Enhancing Visual Cryptography Using Digital Watermarking
T2 - International Journal of Computer Sciences and Engineering
AU - Shobha Elizabeth Rajan, Sreedevi P
PY - 2015
DA - 2015/07/30
PB - IJCSE, Indore, INDIA
SP - 152-156
IS - 7
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2565 2364 downloads 2442 downloads
  
  
           

Abstract

The Visual Cryptography is an efficient cryptographic scheme which uses the human visual system (HVS) characteristics to decrypt images. But the factor that degrades its efficiency is that it is prone to attacks since OR or XOR operations are used for its decryption (HVS). In order to enhance the security factor of visual cryptographic scheme, watermarking of the encrypted images is proposed. Here we consider the Color Extended VC scheme and Intermediate Significant Bit (ISB) based watermarking technique. The shares produced through VC are watermarked on a host image and is made capable of securely transmitting through even attack prone communication channel.

Key-Words / Index Term

Visual Cryptography, Watermarking, ISB

References

[1] Moni Naor and Adi Shamir, “Visual Cryptography”. In Proceedings of Advances in Cryptology, EUROCRYPT 94, Lecture Notes in Computer Science, 1995, (950):Page no( 1-12).
[2] Dr.D.Vasumathi, M.Surya Prakash Rao, M.Upendra Kumar, Dr.Y.Ramadevi, Dr.R.Rajeswara Rao, “Novel Approach for Color Extended Visual Cryptography ,” International Journal of Computer Trends and Technology- Volume-3, Issue4- 2012.
[3] Kai-Hui Lee and Pei-Ling Chiu.”An Extended Visual cryptography Algorithm for General Access Structures” IEEE Transactions on information Forensics and security,Volume- 7, No. 1,February 2012.
[4] Akram M. Zeki and Azizah A. Manaf, “A Novel Digital Watermarking Technique Based on ISB (Intermediate Significant Bit)”, World Academy of Science, Engineering and TechnologyVol:3 2009-02-23.
[5] Color Extended Visual Cryptography using Error diffusion, InKoo Kang, Gonzalo R. Arce and Heung-Kyu Lee, IEEE Transactions on image processing, VOL. 20, NO. 1, JANUARY 2011.
[6] M.Mohammed Sathik,"Feature Extracton on ColorED x-Ray Images by Bit- plane Slicing Technology Vol. 2(7), 2010, 2820- 2824
[7] E. Verheuland H. V. Tilborg, ”Constructions And Properties Of K Out Of N Visual Secret Sharing Schemes.”Designs, Codes and Cryptography, 11(2), pp.179–196, 1997.
[8] Y. C. Hou, “Visual cryptography for color images”, Pattern Recognition, Vol. 36, pp.1619-1629, 2003.
[9] S.Punitha, S. Thompson and N.Siva Rama Ling “Binary Watermarking Technique based on Visual Cryptography ” , 978-1-4244-7770-8/10/ 2010 IEEE .
[10] N.Ravia Shabnam Parveen, Dr. M.Mohamed Sathik, “Feature Extraction by Bit Plane Slicing Technique”, in International Journal of Computing, Communication and Information System,Volume 1
[11] E.Sangeetha Devi, “Enhanced Visual Secret Sharing Scheme via Halftoning Technique”, 978-1-4244-7770-8/10/2010 IEEE.
[12] HAN Yan-yan and Xi’an China, “A Watermarking-based Visual Cryptography Scheme with Meaningful Shares”, 978-0-7695-4584-4/11 2011 IEEE.
[13] Vidyasagar M. Potdar, Song Han, Elizabeth Chang,” A Survey of Digital Image Watermarking Techniques”, 3rd International Conference on Industrial Informatics (INDIN),2005.
[14] Mauro Barni, Franco Bartolini, and Alessandro Piva, “ Improved Wavelet-Based Digital Watermarking Through Pixel-Wise Masking “, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 10, NO. 5, MAY 2001.
[15] Sanghyun Joo, Youngho Suh, Jaeho Shin, and Hisakazu Kikuchi, “A New Robust Watermarking Embedding into Wavelet DC Components”, ETRI Journal, Volume 24, No. 5, October 2002.
[16] C . S Rawat and Sneha M; S. “Watermarking Of Images Using Hybrid Technique”; International Journal of Application or Innovation in Engineering & Management (IJAIEM) ISSN 2319 - 4847 Special Issue for International Technological Conference-2014.
[17] Preeti Parashar1 and Rajeev Kumar Singh,” A Survey: Digital Image Watermarking Techniques “,International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 7, No. 6 (2014), pp. 111-124.
[18] Sura Ramzi Sheriff ,”Digital Image Watermarking Using Singular Value Decomposition”, Third Scientific Conference Information Technology Volume 7,No 3,2010.
[19] Voyatzis, G and Pitas, I. “Protecting Digital-Image Copyrights: A Framework”, IEEE Trans. On Computer Graphics and Application, Volume. 19, No. 1, pp. 18-24, 1999.
[20] Tripta Deendayal et al, “Enhanced Visual Cryptography Using Color Error diffusion and Digital Watermarking”, Int. J. ComputerTechnology & Applications,Vol-3(1),261-264.
[21] Jayamohan, M., and K. Revathy. "A Hybrid Fractal-Wavelet Digital Watermarking Technique with Localized Embedding Strength." Wireless Networks and Computational Intelligence. Springer Berlin Heidelberg, 2012. 584-591.
[22] A. J. Gonzalez, G. R. Arce, J. Bacca Rodriguez, and lD. L. Lau, “Human visual alpha-stable models for digital halftoning,” in 18th Annual Symposium on Electronic Imaging Science and Technology: Human Vision and Electronic Imaging XI, San Jose, CA, Jan 2006.
[23] R.B. Wolfgang and E.J. Delp, “A Watermark for Digital Images,” Proc. IEEE Int’l Conf. Image Processing, vol. 3, pp. 219-222, 1996.
[24] Ibrahim Nasir, Ying Weng, Jianmin Jiang,” A New Robust Watermarking Scheme for Color Image in Spatial Domain”, School of Informatics, University of Bradford, U.K.
[25] R. Chandramouli and Nasir Memon, “Analysis of LSB Based Image Steganography Techniques”, IEEE 2001.
[26] S. H. Kim and J. P. Allebach, “Impact of HVS models
On Model -based half toning,” IEEE Transactions on
Image Processing, vol. 11, pp. 258–269, Mar 2002.