A DWT blind image watermarking strategy with secret sharing

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A blind image watermarking scheme based on secret sharing in discrete wavelet transform domain is proposed. Watermark was divided into n shadows according to secret sharing scheme. And t or more of those shadows can reconstruct the watermark, while t-1 or less shadows could not do it. In order to achieve optimum embedding strategy, a closed loop embedding process is proposed, which is modified iteratively according to results of performance analysis. The convergence of closed loop watermarking is proved. Independent component analysis is utilized so that detector can not merely detect watermark but also can extract it. Before watermark reconstruction, one way hashing function is used to withstand cheating attacks. The experimental results show that it is robust against a wide range of attacks proposed by Stirmark and it is more safety than traditional watermarking techniques. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Zhang, L., Zhou, P. P., Qian, G. B., & Ji, Z. (2007). A DWT blind image watermarking strategy with secret sharing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4810 LNCS, pp. 377–384). Springer Verlag. https://doi.org/10.1007/978-3-540-77255-2_40

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free