The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography

When an image is created by multiple authors, it is  reasonable that no single author monopolize the ow nership. The  ownership  should  be  shared  among  these  authors,  and   the  ownership  should  be  proved  by  a  group  of  authors.  In  this  paper,  we  propose  a  joint  ownership  protection  scheme  for  co-authored  images. Some  of  the  authors  or  all  of  the  authors  can  verify  ownership.  This  scheme  integrates  discrete  cosine  t ransforms  and  visual  cryptography  to  meet  robustnes s  and  security  requirements. The experimental results show this sc heme successfully resists some common attacks.


[1] Ateniese G., Blundo C., De Santis A., and Stinson D., Visual Cryptography for General Access Structures, Information and Computation , vol. 129, no. 2, pp. 86 106, 1996.

[2] Blundo C., De Santis A., and Stinson D., On the Contrast in Visual Cryptography Schemes, Journal of Cryptology , vol. 12, no. 4, pp. 261 289, 1999.

[3] Boatoa G., Natalea F., Fontanarib C., and Melgani F., Hierarchical Ownership and Deterministic Watermarking of Digital Images Via Polynomial Interpolation, Signal Processing: Image Communication , vol. 21, no. 7, pp. 573 585, 2006.

[4] Chang C. and Chuang J., An Image Intellectual Property Protection Scheme for Gray Level Images Using Visual Secret Sharing Strategy, A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography 283 Pattern Recognition Letters, vol. 23, no. 8, pp. 931 941, 2002.

[5] Chang C., Hsiao J., and Yeh J., A Colour Image Copyright Protection Scheme Based on Visual Cryptography and Discrete Cosine Transform, Imaging Science Journal , vol. 50, no. 3, pp. 133 140, 2002.

[6] Chang C., Hwang K., and Lin Y., A Proof of Copyright Ownership Using Moment Preserving, in Proceedings of 24 th Annual International Computer Software and Application Conference , Taiwan, pp. 198 203, 2000.

[7] Hern ndez J., Amado M., and P rez Gonz lez F., DCT Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a Structure, IEEE Transactions on Image Processing , vol. 9, no. 1, pp. 55 68, 2000.

[8] Hwang R., Digital Image Copyright Protection Scheme Based On Visual Cryptography, Tamkang Journal of Science and Engineering , vol. 3, no. 2, pp. 97 106, 2000.

[9] Lee C. and Lee Y., An Adaptive Digital Image Watermarking Technique for Copyright Protection, IEEE Transactions Consumer Electronics , vol. 45, no. 4, pp. 1005 1015, 1999.

[10] Lou D., Tso H., and Liu J., A Copyright Protection Scheme for Digital Images Using Visual Cryptography Technique, Computer Standards and Interfaces , vol. 29, no. 1, pp. 125 131, 2007.

[11] Naor M. and Shamir A., Visual Cryptography, in Proceedings of Advances in Cryptology- EUROCRYPT, Lecture Notes in Computer Science , Berlin, pp. 1 12, 1995.

[12] Tao B. and Dickinson B., Adaptive Watermarking in the DCT Domain, in Proceedings of IEEE International Conference on Acoustics , Speech, and Signal Processing , Germany, pp. 2985 2988, 1997.

[13] Tu S. and Hsu C., A BTC Based Watermarking Scheme for Digital Images, Information and Security, An International Journal , vol. 15, no. 2, pp. 216 228, 2004.

[14] Tzeng W. and Hu C., A New Approach for Visual Cryptography, Journal of Designs, Codes and Cryptography , vol. 27, no. 3, pp. 207 227, 2002.

[15] Verheul E. and Van Tilborg H., Constructions and Properties of k out of n Visual Secret Sharing Schemes, Journal of Designs, Codes and Cryptography , vol. 11, no. 2, pp. 179 196, 1997.

[16] Wang M. and Chen W., A Hybrid DWT SVD Copyright Protection Scheme Based on K Means Clustering and Visual Cryptography, Computer Standards and Interfaces , vol. 31, no. 4, pp. 757 762, 2009.

[17] Wang F., Yen K., Jain L., and Pan J., Multiuser Based Shadow Watermark Extraction System, Journal of Information Sciences , vol. 177, no. 12, pp. 2522 2525, 2007. Shu-Fen Tu is an associate professor in Department of Information Management at Chinese Culture University in Taiwan. She received the BS degree in management information system from National Cheng Chi University, Taiwan in 1996, the MS degree in information management from National Chi Nan University, Taiwan in 1998, and the PhD degree from the Institute of Information Management, National Central University, Taiwan in 2005. From 1998 to 1999, she was a software engineer of the Syscom Group Co., Taiwan. From February 2005 to July 2005, she was an assistant professor of Department of Information Management, Chaoyang University of Technology, Taiwan. From 2005 to 2008, she was an assistant professor of Department of Information Management, Chinese Culture University. Her current research interests include steganography, secret sharing, and applications of computational intelligence. Ching-Sheng Hsu got his BA degree from the Department of Information Management, National Cheng Chi University, Taiwan, in 1994, MA degree from the Institute of Information Management, National Chi Nan University, Taiwan, in 1998, and PhD degree from the Institute of Information Management, National Central University, Taiwan, in 2005. From 1998 to 1999, he was a software engineer at the Syscom Group Co, Taiwan, where his work focused on the Web based stock trading systems. From 2000 to 2004, he was a part time lecturer of the National Open University, Taiwan. From 2004 to 2011, he was an assistant professor of Department of Information Management, Ming Chuan University. Currently, he is an associat e professor of Department of Information Management, Ming Chuan University. His current research interes ts include digital watermarking and information hiding , visual cryptography, optimization algorithms, and intelligent computer assisted learning and testing systems.