Image Encryption using Visual Cryptography and Watermarking Techniques (original) (raw)
Related papers
A Comprehensive Study on Securing Visual Cryptographical Image Shares Using Digital Watermarking
This paper shows the study of various digital watermarking techniques and also the merits of combining the visual cryptography with digital watermarking techniques. The Visual cryptography scheme (VCS) is an encryption method that encrypts a secret image by breaking it into shares. Unlike traditional cryptographic schemes, decryption of secret image in VCS could be done visually by just superimposing the shares without any complex algorithm. Watermarking can be described as a method of embedding information (audio, video or image) into another signal so that the information cannot be removed easily. The embedded information can either be in hidden or visible form. In case of digital images,. This technique can be used to provide more security to visual cryptographic (VC) image shares by embedding image shares into the host image.
A Wavelet Based Digital Image Watermarking Technique through Encryption with DCT
International Journal of Engineering Research in Computer Science and Engineering
Recently, due to the increase in popularity of the Internet, the problem of digital data security over the Internet is increasing at a phenomenal rate. Watermarking is used for various notable applications to secure digital data from unauthorized individuals. Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. Digital images are widely communicated over the internet. The security of digital images is an essential and challenging task on shared communication channel. In the era of big data and networking, it is necessary to develop a secure and robust digital watermarking scheme with high computational efficiency to protect copyrights of digital works. Digital watermarking is need for the security of digital images to achieve security goals, i.e. confidentiality, integrity and availability. With the use of sophisticated signal/image processing algorithms, manipulations and duplications of audio, images, and videos ...
Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains
Sensors (Basel, Switzerland), 2021
This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analysis of the trade-off between imperceptibility of the watermark and embedding capacity at various levels of decomposition. DCT operation is applied to the selected area to gather the image coefficients into a single vector using a zig-zig operation. We have utilized the same random bit sequence as the watermark and seed for the embedding zone coefficient. The quality of the reconstructed image was measured according to bit correction rate, peak signal-to-noise ratio (PSNR), and similarity index. Experimental results demonstrated that the proposed scheme is highly robust under different types of image-processing attacks. Several image attacks, e.g., JPEG compression, filtering, noise addition, cropping, sharpening, and bit-plane removal, w...
A NEW IMAGE ENCRYPTION AND DATA HIDING TECHNIQUE USING WAVELET TRANSFORM
In this paper a new image encryption and decryption is proposed by using wavelet Packet decomposition. Data hiding is also embedding in the encrypted image. In the process of encryption original image is wavelet decomposed; further security can be achieved by rotational transform of the pixels that is the pixels are rotated after decomposing using wavelet transform. The data to be hided is embedded after rotational transform of the image; the resultant image is encrypted image with data hiding .The data recovered from data hided image by using inverse data hiding after the decrypt the image by inverse rotational transform and inverse wavelet decomposition. This encryption and data hiding technique is efficient technique for secure image and data transmission.
International Journal of Engineering and Advanced Technology, 2019
In this paper, a novel dual image watermarking method is proposed to provide the copyright protection to digital images. In this proposed method, the lower and higher frequency subbands of the decomposed original image are modified by inserting the watermark information using different transforms. The implementation of a method that combines the visual cryptography with dual image watermarking to provide the security for the digital images during an exchange in open networks. The Arnold transform is used to encrypt the second watermark to employ the secure communication. Based on the proposed, the perceptibility and robustness of the distributed images can be increased. The original and watermarked images look like same and the PSNR and NCC are calculated for analyzing the system performance. This method is more robust and secure than existing methods
Comparative Study on Watermarking & Image Encryption for Secure Communication
Abstract—Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
Digital Watermarking of Images and Wavelets
The aim of this paper is a new digital watermarking method. This is a very simple and very fast method. At its basis stays the D.W.T. This transform has a great advantage, its details separation capacity. From this characteristic is inspired the title of the paper. First is established the place of the digital watermarking between the information security methods. Then are presented the new watermark embedding and extraction methods and some simulation results are reported. The digital watermarking method, presented in this paper, can be slightly modified, to embed in the watermark a text containing different information about the watermarking process, named private key. So, a new encryption method of this private key, based on the transmission of images, was obtained. The robustness of the new digital watermarking method against some attacks, like the JPEG compression, was studied. Because the proposed method is fragile against attacks based on translations, in the last paragraph is suggested the substitution of the D. W. T. with a discrete translations invariant wavelet transform.
ROBUST IMPERCEPTIBLE DIGITAL IMAGE WATERMARKING BASED ON DISCRETE WAVELET&COSINE TRANSFORMS
Digital watermarking is a technique by which we can get the more authentication and copyright protection.In the age of internet,a huge amount of multimedia data has been transferred in terms of audio, video and image.For transferring a data in high speed and secure manner,digital image watermarking is used. To provide an authentication and copyright protection in digital image watermarking, two methods,spatial domain method and frequency domain method are used, where the frequency domain method is too much imperceptibleas compared to spatial domain. The peak signal to noise ratio (PSNR) is used as a metric to evaluate the performances of the method taken for discussion as PSNR value presents the robustness of the watermark.PSNR value is a measure of the watermarked image quality and penalizes thevisibility of noise in an image. Thus, two images that areexactly the same will produce an infinite PSNR value.Thus we can get robust and imperceptible watermarking by using a DWT and DCT algorithm.