We are proposing a simple watermarking method
based on visual cryptography. The method is based on selection of
specific pixels from the original image instead of random selection of
pixels as per Hwang [1] paper. Verification information is generated
which will be used to verify the ownership of the image without the
need to embed the watermark pattern into the original digital data.
Experimental results show the proposed method can recover the
watermark pattern from the marked data even if some changes are
made to the original digital data.
[1] R. Hwang, A digital Image Copyright Protection Scheme Based on
Visual Cryptography, Tambang Journal of science and Engineering,
vol.3, No.2, pp. 97-106 (2000).
[2] N.Naor and A. Shamir, Visual Cryptography, Advances in Cryptology:
Eurocrypt'94, Springer - Verleg, Berlin, pp l-129 (1995).
[3] D. Stinson, http://www.cacr.math.uwaterloo.ca/~dstinson/visual.html
(2003).
[4] L. Hawkes, A.Yasinsac and C. Cline, An Application of Visual
Cryptography to Financial Documents; technical report TR001001,
Florida State University (2000).
[5] A. Bonnis and A. Santis, Randomness in secret sharing and visual
cryptography schemes, Theor. Comput. Sci, 314, pp 351-374 (2004).
[6] N. Paul, D. Evans, A. Rubin and D. Wallach, Authentication for remote
voting, workshop on human-computer interaction and security systems,
Fort Lauderdale, Florida, April (2003).
[7] C. Yang, A note on Efficient Color Visual Encryption, vol.18, pp 367-
372 (2002).
[8] W. Stallings, Cryptography and Security, third edition, Prentice Hall,
(2003).
[1] R. Hwang, A digital Image Copyright Protection Scheme Based on
Visual Cryptography, Tambang Journal of science and Engineering,
vol.3, No.2, pp. 97-106 (2000).
[2] N.Naor and A. Shamir, Visual Cryptography, Advances in Cryptology:
Eurocrypt'94, Springer - Verleg, Berlin, pp l-129 (1995).
[3] D. Stinson, http://www.cacr.math.uwaterloo.ca/~dstinson/visual.html
(2003).
[4] L. Hawkes, A.Yasinsac and C. Cline, An Application of Visual
Cryptography to Financial Documents; technical report TR001001,
Florida State University (2000).
[5] A. Bonnis and A. Santis, Randomness in secret sharing and visual
cryptography schemes, Theor. Comput. Sci, 314, pp 351-374 (2004).
[6] N. Paul, D. Evans, A. Rubin and D. Wallach, Authentication for remote
voting, workshop on human-computer interaction and security systems,
Fort Lauderdale, Florida, April (2003).
[7] C. Yang, A note on Efficient Color Visual Encryption, vol.18, pp 367-
372 (2002).
[8] W. Stallings, Cryptography and Security, third edition, Prentice Hall,
(2003).
@article{"International Journal of Information, Control and Computer Sciences:62023", author = "Mahmoud A. Hassan and Mohammed A. Khalili", title = "Self Watermarking based on Visual Cryptography", abstract = "We are proposing a simple watermarking method
based on visual cryptography. The method is based on selection of
specific pixels from the original image instead of random selection of
pixels as per Hwang [1] paper. Verification information is generated
which will be used to verify the ownership of the image without the
need to embed the watermark pattern into the original digital data.
Experimental results show the proposed method can recover the
watermark pattern from the marked data even if some changes are
made to the original digital data.", keywords = "Watermarking, visual cryptography, visualthreshold.", volume = "1", number = "8", pages = "2598-4", }