Skip to main navigation Skip to search Skip to main content

Watermarking-based transparency authentication in visual cryptography

  • Hao Luo*
  • , Jeng Shyang Pan
  • , Zhe Ming Lu
  • , Bin Yih Liao
  • *Corresponding author for this work
  • National Kaohsiung University of Science and Technology
  • Sun Yat-Sen University

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper proposes two transparency authentication schemes used in visual cryptography, which are based on watermarking techniques. In the first scheme, a secret image can be perceptible when stacking two transparencies. In addition, another watermark image is visible when shifting one transparency to an appropriate position and stacking it with the other transparency. In the second scheme, both the secret image and the watermark are of the same size, while in the first scheme, the watermark is half of the size of the secret image. No computer aid is needed in decryption in the first scheme while simple computation is required in the second one. The secret image and the watermark are encrypted at the same time in the two schemes. Experimental results demonstrate the two schemes are effective and practical.

Original languageEnglish
Title of host publicationProceedings of The 7th International Conference on Intelligent Systems Design and Applications, ISDA 2007
Pages609-614
Number of pages6
DOIs
StatePublished - 2007
Event7th International Conference on Intelligent Systems Design and Applications, ISDA'07 - Rio de Janeiro, Brazil
Duration: 22 Oct 200724 Oct 2007

Publication series

NameProceedings of The 7th International Conference on Intelligent Systems Design and Applications, ISDA 2007

Conference

Conference7th International Conference on Intelligent Systems Design and Applications, ISDA'07
Country/TerritoryBrazil
CityRio de Janeiro
Period22/10/0724/10/07

Fingerprint

Dive into the research topics of 'Watermarking-based transparency authentication in visual cryptography'. Together they form a unique fingerprint.

Cite this