2006
DOI: 10.1007/11864349_61
|View full text |Cite
|
Sign up to set email alerts
|

A Statistical Approach for Ownership Identification of Digital Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…Visual cryptography [13][14][15] is such one kind of lossless watermarking scheme which furnishes the requirement by utilizing the codebook concept to divide an image into several different sharing images and produce the same by stacking when a dispute for ownership arises.Visual cryptography serves as a good technique against tampering of digital media and proving its rightful ownership and gained much attention for researchers in recent years. Many watermarking schemes based on visual cryptography have already been proposed [19][20][21][22][23][24][25][26]. The basic idea is to generate two shares of the watermark…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Visual cryptography [13][14][15] is such one kind of lossless watermarking scheme which furnishes the requirement by utilizing the codebook concept to divide an image into several different sharing images and produce the same by stacking when a dispute for ownership arises.Visual cryptography serves as a good technique against tampering of digital media and proving its rightful ownership and gained much attention for researchers in recent years. Many watermarking schemes based on visual cryptography have already been proposed [19][20][21][22][23][24][25][26]. The basic idea is to generate two shares of the watermark…”
Section: Related Workmentioning
confidence: 99%
“…Consequently, these two shares are stacked up to reveal the watermark and visually decrypt it to prove the rightful ownership. A visual cryptographic watermarking scheme based on the concept of generation of two based on the pixel values of the binary watermark, its global mean and also, the mean of some random pixels within the image was proposed in [20][21]. Other scheme comparing the global mean of the pixels values has been proposed in [22].…”
Section: International Journal Of Computer Applications (0975 -8887)mentioning
confidence: 99%
“…Watermarking techniques based on visual cryptography and either discrete wavelet transform or discrete cosine transform have been proposed for copyright protection of the images [19][20][21][22][23][24][25]. These schemes generate two shares of the watermark based on watermark and local statistics of the pixel values.…”
Section: Related Workmentioning
confidence: 99%
“…These two shares are stacked together for the visual decryption to reveal watermark in case of dispute. Hsu and Hou proposed random average watermarking embedding(RAWE) scheme using visual cryptography for generation of shares based on the pixel value of the binary watermark, the global mean of the pixels in the image and the mean of some random pixels from the image [20,21]. An alternative to their method is pixel watermarking embedding (PWE) scheme that compares the global mean with the pixels in the image [11].…”
Section: Related Workmentioning
confidence: 99%
“…Here the feature vector itself acts as a master key to generate the owner share. To reduce the false positive rate C.S Hsu [8,9] generated a master key using sample statistics. Alternatively, Manglem Singh et al [10] have chosen global mean of target image as a threshold.…”
Section: Introductionmentioning
confidence: 99%