Watermarking and Cryptography based Image Security Algorithms: A Survey

Authors(2) :-Amit Kumar Sharma, Aman Kumar

With the coming era of Internet, more and more data are transmitted and exchanged on the networked systems to enjoy the rapid speed and convenience. However, in the cyberspace, the availability of duplication methods encourages the violation of intellectual property rights of digital data, such as document, image, audio, and video. Therefore, the protection of rightful ownership of digital data has become an important issue in recent years. This study discusses various algorithms developed over the years for securing digital images. Algorithms for watermarking (primarily based on transforms) and cryptography (primarily based on visual cryptography scheme) are discussed.

Authors and Affiliations

Amit Kumar Sharma
Department of Computer Science and Engineering, L.R. Institute of Engineering And Technology, Solan, Himachal Pradesh, India
Aman Kumar
Department of Computer Science and Engineering, L.R. Institute of Engineering And Technology, Solan, Himachal Pradesh, India

Image Encryption, Cryptography, Watermarking, Survey

  1. M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology-EUROCRYPT ’94, LNCS 950, Springer-Verlag, pp. 1-12, 1995.
  2. R. Ito, H. Kuwakado, and H. Tanaka, “Image size invariant visual cryptography,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E82-A, no. 10, pp. 2172-2177, 1999.
  3. T. L. Lin, S. J. Horng, K. H. Lee, P. L. Chiu, T. W. Kao, Y. H. Chen, R. S. Run, J. L. Lai, and R. J. Chen, “A novel visual secret sharing scheme for multiple secrets without pixel expansion,” Expert Systems with Applications, vol. 37, no. 12, pp. 7858-7869, 2010.
  4. S. F. Tu and Y. C. Hou, “Design of visual cryptographic methods with smooth-looking decoded images of invariant size for gray level images,” Imaging Science Journal, vol. 55, no. 2, pp. 90101, 2007.
  5. C. N. Yang, “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters, vol. 25, no. 4, pp. 481-494, 2004.
  6. O. Kafri and E. Keren, “Encryption of pictures and shapes by random grids,” Optics Letters, vol. 12, no. 6, pp. 377-379, June 1987.
  7. S. J. Shyu, “Image encryption by random grids,” Pattern Recognition, vol. 40, no. 3, pp. 1014-1031, 2007.
  8. S. J. Shyu, “Image encryption by multiple random grids,” Pattern Recognition, vol. 42, no. 7, pp. 15821596, 2009.
  9. T. H. Chen and K. H. Tsao, “Visual secret sharing by random grids revisited,” Pattern Recognition, vol. 42, no. 9, pp. 2203-2217, 2009.
  10. T. H. Chen and K. H. Tsao, “User-friendly random-grid-based visual secret sharing,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 21, no. 11, pp. 1693-1703, 2011.
  11. D. C. Lou, H. H. Chen, H. C. Wu, and C. S. Tsai, “A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares,” Displays, vol. 32, no. 3, pp. 118-134, 2011.
  12. K. H. Lee and P. L. Chiu, “An extended visual cryptography algorithm for general access structures,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 1 part 2, pp. 219-229, 2012.
  13. G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, “Extended schemes for visual cryptography,” Theoretical Computer Science, vol. 250, pp. 143-161, 2001.
  14. Y. C. Hou and J. H. Wu, “An extended visual cryptography scheme for concealing color images,” in Proceeding of The 5th Conference on Information Management and Police Administrative Practice, Taoyuan, Taiwan, pp. 62-69, (in Chinese) 2001.
  15. Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,” IEEE Transactions on Image Processing, vol. 15, no. 8, pp. 2441-2453, 2006.
  16. Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 383396, 2009.
  17. C. C. Chang, W. L. Tai, and C. C. Lin, “Hiding a secret color image in two color images,” Imaging Science Journal, vol. 53, no. 4, pp. 229240, 2005.
  18. M. Nakajima and Y. Yamaguchi, “Enhancing registration tolerance of extended visual cryptography for natural images,” Journal of Electronic Imaging, vol. 13, no. 3, pp. 654662, 2004.
  19. W. P. Fang, “Friendly progressive visual secret sharing,” Pattern Recognition, vol. 41, pp. 1410-1414, 2008.
  20. C. C. Thien and J. C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 12, pp. 11611169, 2003.
  21. Peyman Rahmati, and Andy Adler, and Thomas Tran. ?Watermarking in E-commerc, (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 4, No. 6, 2013
  22. Swathi.K, Ramudu.K, Robust Invisible QR Code Image Watermarking Algorithm in SWT Domai, International Journal of Innovative Research in Computer and Communication Engineering, Vol.2
  23. M. A. Suhail and M. S. Obaidat, "Digital watermarking-based DCT and JPEG model," in IEEE Transactions on Instrumentation and Measurement, vol. 52, no. 5, pp. 1640-1647, Oct. 2003.
  24. Gu Tianming and Wang Yanjie, "DWT-based digital image watermarking algorithm," Electronic Measurement & Instruments (ICEMI), 2011 10th International Conference on, Chengdu, 2011, pp. 163-166.
  25. C. Y. Yang, W. Y. Hwang and Y. F. Cheng, "IWT-Based Watermarking By Adaptive Bit-Labeling Scheme," Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on, Harbin, 2008, pp. 1165-1168.
  26. D. Wei, Y. Weiqi, Q. Dongxu," Digital image watermarking based on discrete wavelet transform", Journal of Computer Science and Technology, Vol. 17, No. 2, pp. 129139, 2002
  27. S. S. Gonge, A. Ghatol,"A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image", International Symposium on Security in Computing and Communication, pp. 290-303, 2015
  28. C. Rajeev, K. P. Girish, "Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform", Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Advances in Intelligent Systems and Computing, Vol. 324, pp 667-672
  29. D. K. Thind and S. Jindal," A Semi Blind DWT-SVD Video Watermarking", Procedia Computer Science, Vol. 46, 2015, pp. 1661-1667
  30. M. Malonia and S. K. Agarwal, "Digital Image Watermarking using Discrete Wavelet Transform and Arithmetic Progression technique," 2016 IEEE Students' Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, 2016, pp. 1-6.
  31. R. H. Laskar, M. Choudhury, K. Chakraborty, S. Chakraborty,"A Joint DWT-DCT Based Robust Digital Watermarking Algorithm for Ownership Verification of Digital Images", Computer Networks and Intelligent Computing, Springer Berlin Heidelberg, 2011
  32. F. Shi, Y. Shi and L. Lai, "Optimization on digital watermarking algorithm based on SVD-DWT," 2011 IEEE International Conference on Granular Computing, Kaohsiung, 2011, pp. 582-585.

Publication Details

Published in : Volume 3 | Issue 8 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 737-745
Manuscript Number : IJSRSET1738204
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Amit Kumar Sharma, Aman Kumar, " Watermarking and Cryptography based Image Security Algorithms: A Survey, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 8, pp.737-745, November-December-2017.
Journal URL : http://ijsrset.com/IJSRSET1738204

Article Preview

Follow Us

Contact Us