An IPR protection scheme based on wavelet transformation and visual cryptography
Autor: | A-Yu Tseng, Zen-Yu Quan, Hsin-Ju Liu, Young Chang Hou |
---|---|
Rok vydání: | 2016 |
Předmět: |
Scheme (programming language)
Theoretical computer science General Computer Science 020206 networking & telecommunications ComputingMilieux_LEGALASPECTSOFCOMPUTING 02 engineering and technology Digital watermarking wavelet transformation visual cryptography law of large numbers copyright protection Visual cryptography Wavelet Transformation (function) Law of large numbers 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing Electrical and Electronic Engineering Arithmetic computer Digital watermarking Mathematics computer.programming_language |
Zdroj: | Volume: 24, Issue: 5 4063-4082 Turkish Journal of Electrical Engineering and Computer Science |
ISSN: | 1300-0632 1303-6203 |
Popis: | As information technology is fast developing, it brings great convenience to our everyday life. However, hackers may also access confidential data illegally and easily from computers over the Internet. Therefore, how to protect property rights against infringement is an essential issue. Digital watermarking is a method that adds personal information to an intellectual property to protect one's ownership rights. Should the intellectual property be disputed, the owner can retrieve the watermark and prove ownership rights. Based on the principles of visual cryptography and the law of large numbers, our study generates shares by comparing pseudorandomly selected value pairs during the processes of embedding and verifying the hidden watermark. The wavelet transformation coefficients of the LL$_{3}$ region are used as the sample population. Experimental results indicate that our method has good robustness against darkening, lightening, blurring, sharpening, noising, distortion, jitter, JPEG, and cropping attacks. There are 3 advantages to our method: 1) robustness is retained when the protected image suffers from attacks; 2) unexpanded shares are created to reduce the size of every share; 3) the embedded watermark is decoded by the human visual system during the verification process. |
Databáze: | OpenAIRE |
Externí odkaz: |