Image Watermarking using Visual Cryptography. Furht, B., editor In Encyclopedia of Multimedia, pages 344–345. Springer US, 2008. 00000Paper abstract bibtex DefinitionA new class of digital watermarking techniques is based on visual cryptography.Recent works have introduced a new class of digital watermarking schemes which employ visual cryptography (VC) concepts to secure watermarked content [1–3]. In addition, VC-based watermarking may be used to robustify recognition of an extracted watermark from images which have been subjected to attacks [2,3]. For example, in the approach shown in Fig. 1, instead of embedding a binary logo directly to the host image, a VC-based watermarking scheme first encrypts the binary logo into two noise-like binary shares. One of the two generated shares can be viewed as a private watermark share and is kept by the owner. The other share represents a public watermark share and is being embedded to the host image using a conventional watermarking technique which operates either in the spatial or frequency domain of the host image [2,3].
@incollection{furht_image_2008,
title = {Image {Watermarking} using {Visual} {Cryptography}},
copyright = {©2008 Springer-Verlag},
isbn = {978-0-387-74724-8 978-0-387-78414-4},
url = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_84},
abstract = {DefinitionA new class of digital watermarking techniques is based on visual cryptography.Recent works have introduced a new class of digital watermarking schemes which employ visual cryptography (VC) concepts to secure watermarked content [1–3]. In addition, VC-based watermarking may be used to robustify recognition of an extracted watermark from images which have been subjected to attacks [2,3]. For example, in the approach shown in Fig. 1, instead of embedding a binary logo directly to the host image, a VC-based watermarking scheme first encrypts the binary logo into two noise-like binary shares. One of the two generated shares can be viewed as a private watermark share and is kept by the owner. The other share represents a public watermark share and is being embedded to the host image using a conventional watermarking technique which operates either in the spatial or frequency domain of the host image [2,3].},
language = {en},
urldate = {2016-05-03},
booktitle = {Encyclopedia of {Multimedia}},
publisher = {Springer US},
editor = {Furht, Borko},
year = {2008},
note = {00000},
pages = {344--345}
}
Downloads: 0
{"_id":"n3sg6LyqiNQiLBKSv","bibbaseid":"furht-imagewatermarkingusingvisualcryptography-2008","authorIDs":[],"bibdata":{"bibtype":"incollection","type":"incollection","title":"Image Watermarking using Visual Cryptography","copyright":"©2008 Springer-Verlag","isbn":"978-0-387-74724-8 978-0-387-78414-4","url":"http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_84","abstract":"DefinitionA new class of digital watermarking techniques is based on visual cryptography.Recent works have introduced a new class of digital watermarking schemes which employ visual cryptography (VC) concepts to secure watermarked content [1–3]. In addition, VC-based watermarking may be used to robustify recognition of an extracted watermark from images which have been subjected to attacks [2,3]. For example, in the approach shown in Fig. 1, instead of embedding a binary logo directly to the host image, a VC-based watermarking scheme first encrypts the binary logo into two noise-like binary shares. One of the two generated shares can be viewed as a private watermark share and is kept by the owner. The other share represents a public watermark share and is being embedded to the host image using a conventional watermarking technique which operates either in the spatial or frequency domain of the host image [2,3].","language":"en","urldate":"2016-05-03","booktitle":"Encyclopedia of Multimedia","publisher":"Springer US","editor":[{"propositions":[],"lastnames":["Furht"],"firstnames":["Borko"],"suffixes":[]}],"year":"2008","note":"00000","pages":"344–345","bibtex":"@incollection{furht_image_2008,\n\ttitle = {Image {Watermarking} using {Visual} {Cryptography}},\n\tcopyright = {©2008 Springer-Verlag},\n\tisbn = {978-0-387-74724-8 978-0-387-78414-4},\n\turl = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_84},\n\tabstract = {DefinitionA new class of digital watermarking techniques is based on visual cryptography.Recent works have introduced a new class of digital watermarking schemes which employ visual cryptography (VC) concepts to secure watermarked content [1–3]. In addition, VC-based watermarking may be used to robustify recognition of an extracted watermark from images which have been subjected to attacks [2,3]. For example, in the approach shown in Fig. 1, instead of embedding a binary logo directly to the host image, a VC-based watermarking scheme first encrypts the binary logo into two noise-like binary shares. One of the two generated shares can be viewed as a private watermark share and is kept by the owner. The other share represents a public watermark share and is being embedded to the host image using a conventional watermarking technique which operates either in the spatial or frequency domain of the host image [2,3].},\n\tlanguage = {en},\n\turldate = {2016-05-03},\n\tbooktitle = {Encyclopedia of {Multimedia}},\n\tpublisher = {Springer US},\n\teditor = {Furht, Borko},\n\tyear = {2008},\n\tnote = {00000},\n\tpages = {344--345}\n}\n\n","editor_short":["Furht, B."],"key":"furht_image_2008","id":"furht_image_2008","bibbaseid":"furht-imagewatermarkingusingvisualcryptography-2008","role":"editor","urls":{"Paper":"http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_84"},"downloads":0,"html":""},"bibtype":"incollection","biburl":"http://www.telemidia.puc-rio.br/~alan/files/all.bib","creationDate":"2020-03-03T14:08:14.577Z","downloads":0,"keywords":[],"search_terms":["image","watermarking","using","visual","cryptography"],"title":"Image Watermarking using Visual Cryptography","year":2008,"dataSources":["jAxurbvLP8q5LTdLa"]}