Visual cryptography based lossless watermarking for sensitive images

S Borra, L HR - Swarm, Evolutionary, and Memetic Computing: 6th …, 2016 - Springer
S Borra, L HR
Swarm, Evolutionary, and Memetic Computing: 6th International Conference …, 2016Springer
Digital technology has resulted in a cost effective and easy means for storage and
communication of the multimedia data, which can also be easily downloadable and
reproducible. Hence, there is a growing need for techniques that identify the right owner of
Intellectual Property (IP). Visual Cryptography based Lossless Watermarking (VCLW)
techniques are hybrid schemes that are now being developed as a potential replacement for
conventional watermarking systems as they are effective in resolving existing tradeoff …
Abstract
Digital technology has resulted in a cost effective and easy means for storage and communication of the multimedia data, which can also be easily downloadable and reproducible. Hence, there is a growing need for techniques that identify the right owner of Intellectual Property (IP). Visual Cryptography based Lossless Watermarking (VCLW) techniques are hybrid schemes that are now being developed as a potential replacement for conventional watermarking systems as they are effective in resolving existing tradeoff among the requirements. This paper presents theoretical analysis of spatial domain VCLW techniques and performs practical performance analysis, to identify gaps. These hybrid techniques offer promising quality of target image after watermarking; there are still a number of challenges associated such as security, robustness, pixel expansion, complexity, image formats etc. Among multiple requirements, achieving fewer rates of false positives is identified as fundamental requirement in order to discourage malicious owners and to protect Intellectual Property. The analysis of comparative results shows that with the existing techniques, the false positive rate could not reach 10−6, which is the maximum limit suggested by Cox et al. for watermarking. This is due to the unique security challenge called C3 rule that involves the design of code tables, selection of features, thresholds and combination functions. It is concluded that in the applications where the images to be protected are very sensitive such as military, medical and satellite images, VCLW techniques can be a potential replacement for conventional watermarking systems, given that the algorithms fills the important gaps.
Springer
Showing the best result for this search. See all results