A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image.
M. Kutter and F. A. P. Petitcolas, “Fair Benchmark for Image Watermarking Systems,” Proceedings of the Conference on Security and Watermarking of Multimedia Contents, San Jose, 25 January 1999, pp. 226-239.
G. C. Langelaar, J. C. A. van der Lubbe and J. Biemond, “Copy Protection for Multimedia Data Based on Labelling Techniques,” Proceedings of the 17th Symposium on Information Theory in the Benelux, Enschede, May 1996, pp. 33-39.
M. S. Fu and O. C. Au, “Joint Visual Cryptography and Watermarking,” Proceedings of the IEEE International Conference on Multimedia and Expo, Taipei, 30 June 2004, pp. 975-978. doi:10.1109/ICME.2004.1394365
H. Inoue, A. Miyazaki, A. Yamamoto and T. Katsura, “A Digital Watermark Technique Based on the Wavelet Transform and Its Robustness on Image Compression and Transformation,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 82, No. 1, 1999, pp. 2-10.
G. W. Braudaway, K. A. Magerlein and F. C. Mintzer, “Protecting Publicly Available Images with a Visible Image Watermark,” Proceedings of the SPIE, San Jose, 1 February 1996, pp. 126-133. doi:10.1117/12.235469
J. Weir and W.-Q. Yan, “Sharing Multiple Secrets Using Visual Cryptography,” Proceedings of the IEEE International Symposium on Circuits and Systems, Taipei, 24-27 May 2009, pp. 509-512.
Z. X. Fu and B. Yu, “Research on Rotation Visual Cryptography Scheme,” Proceedings of the International Symposium on Information Engineering and Electronic Commerce, Ternopil, 16-17 May 2009, pp. 533-536.
X.-Q. Tan, “Two Kinds of Ideal Contrast Visual Cryptography Schemes,” Proceedings of the 2009 International Conference on Signal Processing Systems, Singapore, 1517 May 2009, pp. 450-453. doi:10.1109/ICSPS.2009.119
H. B. Zhang, X. F. Wang, W. H. Cao and Y. P. Huang, “Visual Cryptography for General Access Structure by Multi-Pixel Encoding with Variable Block Size,” Proceedings of the International Symposium on Knowledge Acquisition and Modeling, Wuhan, 21-22 December 2008, pp. 340-344. doi:10.1109/KAM.2008.91
M. Heidarinejad, A. A. Yazdi and K. N. Plataniotis, “Algebraic Visual Cryptography Scheme for Color Images,” Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, 31 March-4 April 2008, pp. 1761-1764.
W. Qiao, H. D. Yin and H. Q. Liang, “A Kind of Visual Cryptography Scheme for Color Images Based on Halftone Technique,” Proceedings of the International Conference on Measuring Technology and Mechatronics Automation, Zhangjiajie, 11-12 April 2009, pp. 393-395.
L. M. E. Bakrawy, N. I. Ghali, A. E. Hassanien and A. Abraham, “An Associative Watermarking Based Image Authentication Scheme,” Proceedings of the 10th International Conference on Intelligent Systems Design and Applications (ISDA 2010), Cairo, 29 November-1 December 2010, pp. 823-828. doi:10.1109/ISDA.2010.5687160
V. V. R. Prasad and R. Kurupati, “Secure Image Watermarking in Frequency Domain Using Arnold Scrambling and Filtering,” Advances in Computational Sciences and Technology, Vol. 3, No. 2, 2010, pp. 236-244.
P. Fakhari, E. Vahedi and C. Lucas, “Protecting Patient Privacy from Unauthorized Release of Medical Images Using a Bio-Inspired Wavelet-Based Watermarking Approach,” Digital Signal Processing, Vol. 21, No. 3, 2011, pp. 433-446. doi:10.1016/j.dsp.2011.01.014
A. Sleit and A. Abusitta, “Advancedd Digital Image Copyright Protection Based on Visual Cryptography,” Proceeding of the 4th International Multi Conference on Computer Science & Information Technology, Amman, 5-7 April 2006, pp. 365-375.