International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 6

ISSN 2229-5518

Digital Watermarking Scheme For Secret Images Using

Visual Cryptography

Jitendra Saturwar,Dr.D.N.Chaudhari

Abstractthe extreme development of internet has made the transmission, distribution and access to digital media very convenient. So, media pro- ducers are more frequently dealing with illegal and unauthorized usage of their productions.Over the last two decades, digital watermarking has been addressed as an effective solution to safeguard copyright laws and an extensive effort has been made to design robust watermarking algorithms. Basi- cally, a digital watermark is an invisible mark that is inserted into a digital media such as audio, image, or video to identify illegal distributions of copyright protected digital media and also law breaking customers. A digital watermark must have special features to achieve functionalities desired. The embed- ded mark should be robust enough against various watermarking attacks, while keeping the perceived quality of the host signal unchanged (the imper- ceptibility requirement). Watermarking attacks consist of deliberate attacks made maliciously to remove or change the mark sequence by law- breakers, unintentional modifications caused by coding and compression that are made to the digital media prior to transmission and/or storage, and errors occurred during the transmission of the media through the networks.Digital watermarking using visual cryptography provides improved security for encrypting secret images.

Index Terms— Watermarking, Visual cryptography, Image copyright, Cryptography, Digital Envelopeing

————————— ——————————

1 INTRODUCTION

A watermarking technology is now providing highly attention as a desired method and technology for pro- tecting copyrights for digital data [1]. A watermarking has been defined as the practice of embedding identification in- formation in an image, audio, video or other digital media el- ement to provide privacy protection from attackers . The iden- tification information is called “watermark pattern” and the original digital image that contains watermark pattern is named “marked image”. The embedding takes place by manipulating the contents of the digital image . Also, a secret key is given to embed “watermark pattern” and to retrieve it as well. Figure 1 gives summarize of standard watermarking embedding scheme. Basically, if the owner wants to protect his/her image, the owner of an image has to register the image with the copy- right office by sending a copy to them. The copyright office archives the image, together with information about the right- ful owner. When dispute occurs, the real owner contacts the copyright office to obtain proof that he is the rightful owner. If he did not register the image, then he should at least be able to show the film negative. However, with the rapid acceptance of digital photography, there might never have been a negative. Theoretically, it is possible for the owner to use a watermark embedded in the image to prove that he/she owns it .
A typical image watermark algorithm must satisfy the fol-
lowing two properties: transparency and robustness. Trans- parency means that the embedded watermark pattern does
not visually spoil the original image fidelity and should be invisible. Robustness means the watermark pattern is not easy to detect and remove illegally. Moreover, any modifications of the image values have to be invisible, and the watermark method has to be robust or fragile in order to provide protec- tion against attackers.method has to be robust or fragile in or- der to provide protection against attackers.

2 LITERATURE REVIEW

B.surekha [3] suggested The concept of Visual Secret Sharing (VSS) is used to hide a digital watermark into Discrete Wavelet Transform of a host image. The features of the image are used to split the watermark into two random binary imag- es called shares. One share is generated during watermark embedding phase and is kept secret with an arbitrator. The other share is extracted from the controversial image during

IJSER © 2013 http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 7

ISSN 2229-5518

watermark extraction phase. Both the shares are combined to extract the original watermark.
Hui-Wen Liao [4] suggested a multiple watermarking
scheme for color images by using YCbCr color model, visual cryptography, histogram modification, integer wavelet trans- form, and the wavelet tree. Under this scheme, all owners will have dual watermark authentication, and the number of own- erships can be increased. Applying the proposed four points distinguishing law, the owner ’s dual watermark can be ex- tracted more imperceptibly. Usually, for multiple watermark- ing, the more embedding watermark will lead to less
quality of watermarked image, however, in proposed proce dure, the increased number of owners does not affect the qual-
ity of the watermarked image and the watermarks after extrac-
tion.
upon the high and low frequency regions of the image after performing statistical analysis. The watermark embedding is done using three frequency transforms, DCT, DWT and DFT
simultaneously in different blocks of the image to hide the information as to which transform is used in the block leading to security of watermark. The number of permutations to de- termine exact watermark locations has been derived mathe- matically.
Li Lianhuan et al. [9], proposes an adaptive image tamper positioning, detection and recovery fragile watermark- ing algorithms. Using k-means clustering algorithm and image spatial visual features associated with the establishment of mechanisms to block the image, digital image to achieve a re- turn to the spatial domain fragile watermarking scheme, and the use of encryption technology to enhance the security of watermarking algorithm..
Adel Hammad Abusitta [1], proposed digital image copyright protection method using watermarking technology. The method does not require that the water-mark pattern to be embedded in to the original digital image. Instead, Verification information is generated which will be used to verify the own- ership of the image. This leaves the marked image equal to the original image.Advantage of this method is that a water-mark pattern can be retrieved easily from marked image even the image is attacked by major changes in pixels bits.
Shyamalendu Kandar et al. [5] proposes a Visual
Cryptographic Scheme for color images where the divided
shares are enveloped in other images using invisible digital watermarking. The shares are generated using Random Num- ber.
B. Surekha et al. [6] also proposed a spatial domain
digital image copyright protection scheme based on Visual
Cryptography (VC) and Spatial Correlation of Colors (SCC) is proposed. A binary feature matrix, extracted from the spatial correlation of host image, is used to split the watermark into two noisy binary images called shares. One of them is generat- ed during watermark embedding phase and is registered with a trusted third party. The other is extracted during watermark extraction phase. Both these shares are combined to recover hidden watermark.
Pradosh Bandyopadhyay et al. [7] framework is able
to embed the color watermark images to color host images and
perceptually the watermark is not visible in the watermarked image. We've used blind method for watermark extraction. With addition to that we also ensure that the extracted water- mark remains intact. Security issue is assured with a secret key and a hash function..
Saurabh Maheshwari et al.[8] proposed randomized
threshold based visual cryptography scheme is used. Each of
the shares generated is embedded into different block through different strategy. The transformations are applied depending
Oclay Duman et al. [10] proposed a binary image is
utilized as a watermark which is embedded using the Discrete
Wavelet Transform (DWT) and the Fractional Fourier Trans- form (FrFT). Use of DWT domain to embed the watermark into the original image in such a way that it is imperceptible by the human visual system. The FrFT orders are used as the encryption keys that allow the watermarking method to be more robust against various attacks. It is also shown that the watermark can be extracted from the watermarked image without needing the knowledge of the original image.
HAN Yan-yan [11]et al. Proposed a visual cryptog- raphy scheme with meaningful shares. Compared to the pre- vious schemes proposed in the literatures, the scheme does not change the original pixel expansion, and not only applies for black and white binary
images, but also for any gray and color images. Meanwhile, the embedded image in a meaningful share is robust. Before and after being extracted the image's quality did not change significantly.
Ching-ling wan et al. [12] proposed two image secret sharing schemes. The first scheme uses two share images to hiding three secret information images, while second scheme uses three share images to hiding four secret information im- ages. By using rotating image and matching block method, the second scheme increase more hiding secret information imag- es.
Young-Chang Hou et al. [13] Proposed a method
does not need to alter the original image and can identify the ownership without restoring to the original image. Besides, our method allows multiple watermarks to be registered for a single host image without causing any damage to other hid- den watermarks.
Ching-Sheng Hsu [14] suggested a method in which image is split into two shares via a 2-out-of-2 visual secret sharing scheme. Then, one of the shares is embedded into the

IJSER © 2013 http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 8

ISSN 2229-5518

host image, and the other is held by the owner. When proving the ownership, the owner has to extract the embedded share and recover the watermark with his/her own share. Based on the security property of visual cryptography, our scheme can make sure that the two shares cannot leak any information about the watermark.3 METHODOLOGY/ MATERIALS AND METHODS

3.1 Existing Technologies And Methods

Various methods for Digital Watermarking using Visual cryp- tography are suggested as given below:
• Random selection of pixel for deciding master share for visual cryptography by Young-Chang Hou.et al.
• Multiple Secret Sharing Method by Ching-Ling Wang et al.
• Watermarking based visual cryptography with Meaning- ful Shares by HAN Yan-yan et al.
• Wavelet Domain watermark embedding and extraction
using FFT proposed by Olcay Duman et al.
• Digital watermarking using DWT,SLSB and VC by
Mrs.D.Mathivadhani et al.
• A Self-adaptive Blind Detection Color Watermarking
Algorithm Based on Wavelet Contrast by Liu Dan.

3.2 Proposed Method

VC Encryption Watermarking VC Decryption

Figure 2: Digital Watermarking using visual cryptography

3.3 METHODOLOGY

This research has proposed the Digital watermarking with the concepts of visual cryptography with improvisations. This research uses a digital watermarking with improvisation to generate the watermarked image which is secure and hard to retrieve by intruder . This research aim towards increase in security and reduction of number of shares to be generate when compared to meaningful shares, multiple secret shares etc. so as to make the watermarking process easy using the algorithm in an optimized way.
For this, this research design the encoding and decod- ing process as shown in fig.2 .
To increase the image security this research will employ the advantages of the VSS scheme to design the proposed tech- nique in embedding the watermark into the image signal and reserve the secret watermark in the copyright holder.

6 PROPOSED SYSTEM AND IMPLICATION

This research has chosen to use the Digital water- marking Technique with visual cryptography for encryption to get the following advantages:
(1) Transparency: the embedded watermark pattern does not visually spoil the original image fidelity and
should be perceptually invisible. Meaningful share im- age can avoid the aware of active attackers.
(2) ) Pixel expansion unchanged: compared to the previ- ous schemes proposed in the literatures, the scheme does not change the original pixel expansion.

Se- cret

Sh

are

Sh are

Embed

in cov-

Embed in cov-

Ex

tra

Ex tr

De- cod-

(3) Robustness: the watermark pattern is hard to detect and remove in an illegal way.
(4) ) Portability: the scheme not only applies for black and
white binary images, but also for any gray and color images.
(5) Feasibility: what this research chose ,is a class of wa- termarking, so the scheme is easy to implement and highly feasible.

7 CONCLUSION

There are various innovative ideas and extensions exist for the basic visual cryptographic model introduced till now. In the existing VC schemes no security is provided to the secret

IJSER © 2013 http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 9

ISSN 2229-5518

shares and adversaries can alter its bit sequences to create fake shares. And in proposed scheme, the vulnerability of these binary secret shares is overcome by hiding them invisibly into some host images. During the decryption phase, the secret shares are extracted from their cover images without needing any of the cover image characteristics because of watermark extraction technique.

ACKNOWLEDGMENT

The authors wish to thank Jawaharlal Darda Institute Of
Enginnering And Technology,Yavatmal.

REFERENCES

[1] Adel Hammad Abusitta “A Visual Cryptography Based Digital

Image Copyright Protection “ Journal of Information Security

2012, (page no. 96-104) doi:10.4236/jis.2012.32012 Published

April 2012 (http://www.SciRP.org/journal/jis)

[2] Jagdeep Verma, Dr.Vineeta Khemchandani “ A Visual Crypto- graphic Technique to Secure Image Shares” International Jour- nal of Engineering Research and Applications (IJERA) ISSN:

2248-9622 www.ijera.com Vol. 2, Issue 1,Jan-Feb 2012, pp.1121-

1125

[3] B Surekhl,Dr GN Swamy, Dr K Rama Linga Reddy “A Novel Copyright Protection Scheme based on Visual Secret Sharing” ICCCNT'12 26th_28th July 2012, Coimbatore, India, IEEE-20180.

[4] Hui-Wen Liao “A Multiple Watermarking Scheme for Color Images” 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing 132-137.

[5] Shyamalendu Kandar, Arnab Maiti, Bibhas Chandra Dhara “Visual Cryptography Scheme for Color Image Using Random Number with Enveloping by Digital Watermarking” IJCSI In- ternational Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org

[6] B.Surekha, G.N.Swamy “Digital Image Ownership Verification Based On Spatial Correlation Of Colors” Int. Journal of Infor- mation assurance and Security,Vol 4,No 6,pp 470-473,2009

[7] Pradosh Bandyopadhyay, Soumik Das ,Prof Alai Chaudhuri, Dr. Monalisa Banerjee “A New Invisible Color Image Water- marking Framework through Alpha Channel” IEEE- International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012

[8] Saurabh Maheshwari, Reena Gunjan, Vijay Laxmi, Manoj S.

Gaur “ROBUST MULTI-MODAL WATERMARKING USING VISUALLY ENCRYPTED WATERMARK” IWSSIP 2012, (page

72-75) 11-13 April 2012, Vienna, Austria ISBN 978-3-200-02328-4.

IJSER © 2013

[9] Li Lianhuan ,Yao Yuxian Yang Xinfeng “Research on Adaptive Restoration Image Fragile Watermark Algorithm” 2011 Interna- tional Conference on Computer Science and Network Technol- ogy December 24-26, 2011 IEEE (page no.1750-1753).

[10] Olcay Duman and olcay Akay “A New Method of wavelet Do- main WaterMark Embedding and Extrection using Fractional Fourier Transform” (page no 187-191)

[11] HAN Yan-yan Xi’an China “A Watermarking-based Visual Cryptography Scheme with Meaningful Shares” 2011 Seventh International Conference on Computational Intelligence and Se- curity 2011 IEEE (page no 870-873) DOI 10.1109/CIS.2011.196

[12] CHING-LIN WANG, CHING-TE WANG, MENG-LIN CHIANG “THE IMAGE MULTIPLE SECRET SHARING SCHEMES WITHOUT PIXEL EXPANSION” Proceedings of the

2011 International Conference on Machine Learning and Cyber- netics, Guilin, 10-13 July, 2011 (page no.1838-1844)

[13] Young-Chang Hou and Pei-Hsiu Huang “IMAGE PROTEC- TION BASED ON VISUAL CRYPTOGRAPHY AND STATIS- TICAL PROPERTY” 2011 IEEE Statistical Signal Processing Workshop (SSP) ©2011 IEEE (page no.481-484)

[14] Ching-Sheng Hsu and Shu-Fen Tu “Digital Watermarking Scheme with Visual Cryptography” Proceedings of the Interna- tional MultiConference of Engineers and Computer Scientists

2008 Vol IIMECS 2008, 19-21 March, 2008, Hong Kong ISBN:

978-988-98671-8-8 IMECS 2008.

[15] Shu-Chien Huang, Chu-Fu Wang “The Image Watermarking Technique Using Visual Secret Sharing Strategy” Proceedings of the Eighth International Conference on Intelligent Systems De- sign and Applications(page no.190-195)

[16] Liu Dan “A Self-adaptive Blind Detection Color Watermarking Algorithm Based on Wavelet Contrast” 2012 International Con- ference on Computer Science and Information Processing (CSIP), 978-1-4673-1411-4/12 ©2012 IEEE(pg no.1411-1413)

[17] Hao Luo1, Jeng-Shyang Pan2, Zhe-Ming Lu3, Bin-Yih Liao2” Watermarking-Based Transparency Authentication in Visual Cryptography” Seventh International Conference on Intelligent Systems Design and Applications, 0-7695-2976-3/07 © 2007

IEEE, pp 609-614

[18] Shu-Chien Huang, Chu-Fu Wang “The Image Watermarking Technique Using Visual Secret Sharing Strategy”, Eighth Inter- national Conference on Intelligent Systems Design and Applica- tions, 978-0-7695-3382-7/08 © 2008 IEEE pp.190-195

[19] Ankita Sengar , Preeti Verma “Digital Watermark performance with Visual Secret Sharing on either of RGB plane of colour im- age”, 978-1-4673-1989-8/12 ©2012 IEEE

[20] Himanshu Sharma , Neeraj Kumar, Govind Kumar Jha “En- hancement of security in Visual Cryptography system using Cover Image share embedded security algorithm (CISEA)”, In- ternational Conference on Computer & Communication Tech-

http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 10

ISSN 2229-5518

nology (ICCCT)-2011, 978-1-4577-1386-611©2011 IEEE pp 462-

467

[21] F. Liu C.-K. Wu “Robust visual cryptography-based watermark- ing scheme for multiple cover images and multiple owners”, Published in IET Information Security June 2010, IET Inf. Secur.,

2011, Vol. 5, Iss. 2, pp. 121–128

[22] Mrs.D.Mathivadhani, Dr.C.Meena “Digital Watermarking and Information Hiding Using Wavelets, SLSB and Visual Cryptog- raphy Method”, 978-1-4244-5967-4/10 ©2010 IEEE

[23] Aditya Vashistha, Rajarathnam Nallusamy, and Sanjoy Paul “NoMark: A Novel Method for Copyright Protection of Digital VideosWithout Embedding Data”, 2010 IEEE International Symposium on Multimedia, 978-0-7695-4217-1/10 © 2010 IEEE pp.167-174

[24] S.Punitha, S.Thompson, N.Siva Rama Lingam “Binary Water- marking Technique based on Visual Cryptography”, 978-1-4244-

7770-8/10 ©2010 IEEE pp.232-235

[25] Chunhua Dong”A DWT-DCT Based Robust Multiple Water- marks for Medical Image”, 978-1-4577-0911-1/12 ©2012 IEEE

IJSER © 2013 http://www.ijser.org