The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Uma técnica de repetição de marca d'água baseada no esquema de compartilhamento visual secreto (VSS) fornece a marca d'água repetida em toda a imagem para evitar o corte da imagem. Neste artigo, a marca d'água é dividida em marca d'água pública e marca d'água secreta usando o esquema VSS para melhorar a segurança da técnica de marca d'água proposta. Ao contrário dos métodos tradicionais, a marca d'água original não precisa ser incorporada diretamente na imagem do host e, portanto, é difícil de ser detectada ou removida pelos piratas ou hackers. A marca d'água recuperada extraída da imagem com marca d'água não requer a imagem original completa, mas requer uma marca d'água secreta. Além disso, a técnica de marca d’água adapta a marca d’água com um tamanho adaptativo de imagem binária para projetar o sistema de marca d’água. Os resultados experimentais mostram que o método proposto pode suportar as operações comuns de processamento de imagens, como filtragem, compressão com perdas e ataque de corte, etc. A marca d'água incorporada é imperceptível e que a marca d'água extraída identifica claramente os direitos autorais do proprietário.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Chuen-Ching WANG, Shen-Chuan TAI, Chong-Shou YU, "Repeating Image Watermarking Technique by the Visual Cryptography" in IEICE TRANSACTIONS on Fundamentals,
vol. E83-A, no. 8, pp. 1589-1598, August 2000, doi: .
Abstract: A repeating watermarking technique based on visual secret sharing (VSS) scheme provides the watermark repeated throughout the image for avoiding the image cropping. In this paper, the watermark is divided into public watermark and secret watermark by using the VSS scheme to improve the security of the proposed watermarking technique. Unlike the traditional methods, the original watermark does not have to be embedded into the host image directly and, thus, it is hard to be detected or removed by the pirates or hackers. The retrieved watermark extracted from the watermarked image does not require the complete original image, but requires a secret watermark. Furthermore, the watermarking technique suits the watermark with an adaptive size of binary image for designing the watermarking system. The experimental results show that the proposed method can withstand the common image processing operations, such as filtering, lossy compression and the cropping attacking etc. The embedded watermark is imperceptible, and that the extracted watermark identifies clearly the owner's copyright.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e83-a_8_1589/_p
Copiar
@ARTICLE{e83-a_8_1589,
author={Chuen-Ching WANG, Shen-Chuan TAI, Chong-Shou YU, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Repeating Image Watermarking Technique by the Visual Cryptography},
year={2000},
volume={E83-A},
number={8},
pages={1589-1598},
abstract={A repeating watermarking technique based on visual secret sharing (VSS) scheme provides the watermark repeated throughout the image for avoiding the image cropping. In this paper, the watermark is divided into public watermark and secret watermark by using the VSS scheme to improve the security of the proposed watermarking technique. Unlike the traditional methods, the original watermark does not have to be embedded into the host image directly and, thus, it is hard to be detected or removed by the pirates or hackers. The retrieved watermark extracted from the watermarked image does not require the complete original image, but requires a secret watermark. Furthermore, the watermarking technique suits the watermark with an adaptive size of binary image for designing the watermarking system. The experimental results show that the proposed method can withstand the common image processing operations, such as filtering, lossy compression and the cropping attacking etc. The embedded watermark is imperceptible, and that the extracted watermark identifies clearly the owner's copyright.},
keywords={},
doi={},
ISSN={},
month={August},}
Copiar
TY - JOUR
TI - Repeating Image Watermarking Technique by the Visual Cryptography
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1589
EP - 1598
AU - Chuen-Ching WANG
AU - Shen-Chuan TAI
AU - Chong-Shou YU
PY - 2000
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E83-A
IS - 8
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - August 2000
AB - A repeating watermarking technique based on visual secret sharing (VSS) scheme provides the watermark repeated throughout the image for avoiding the image cropping. In this paper, the watermark is divided into public watermark and secret watermark by using the VSS scheme to improve the security of the proposed watermarking technique. Unlike the traditional methods, the original watermark does not have to be embedded into the host image directly and, thus, it is hard to be detected or removed by the pirates or hackers. The retrieved watermark extracted from the watermarked image does not require the complete original image, but requires a secret watermark. Furthermore, the watermarking technique suits the watermark with an adaptive size of binary image for designing the watermarking system. The experimental results show that the proposed method can withstand the common image processing operations, such as filtering, lossy compression and the cropping attacking etc. The embedded watermark is imperceptible, and that the extracted watermark identifies clearly the owner's copyright.
ER -