DocumentCode :
1692527
Title :
Notice of Violation of IEEE Publication Principles
Binary watermarking technique based on Visual Cryptography
Author :
Punitha, S. ; Thompson, S. ; Lingam, N.S.R.
Author_Institution :
Amity Sch. of Eng. & Technol., New Delhi, India
fYear :
2010
Firstpage :
232
Lastpage :
235
Abstract :
Notice of Violation of IEEE Publication Principles

"Binary Watermarking Techniques based on Visual Cryptography"
by S.Punitha, S. Thompson, and N. Siva Rama Lingam
in the 2010 IEEE International Conference on Communication Control and Computing Technologies (ICCCCT), October 2010, pp. 232-473

After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE???s Publication Principles.

This paper is a duplication of the original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:

"A Watermarking Technique based on Visual Cryptography"
by B. Surekha, GN Swamy, K. Srinivasa Rao, and A. Ravi Kumar,
in the Journal of Information Assurance and Security, 4 (2009), pp. 470-473

With the explosive growth of internet technology robust methods are being developed to protect the proprietary rights of the multimedia. This paper considers the problem of embedding a binary watermark in a gray-level image using the concept of Visual Cryptography (VC). This paper proposes a watermarking scheme which offers better security than Hwang\´s method, so that, attackers will not be able to detect ownership information. The proposed scheme embeds the secret image without modifying the host image. In addition, the hidden secret image can be extracted without using the original host image and allows multiple watermarks to be embedded in the same image. The experimental results show that the proposed scheme is robust to withstand several image processing attacks such as JPEG compression, noise adding, sharpening and blurring.
Keywords :
Internet; cryptography; data compression; image coding; image watermarking; Internet technology robust methods; JPEG compression; binary watermarking technique; gray-level image; image processing attacks; noise adding; visual cryptography; Cryptography; Image recognition; Pixel; Copyright Protection; Cryptography; Digital Watermarking; Multiple watermarks; Secret Sharing; Visual Cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Control and Computing Technologies (ICCCCT), 2010 IEEE International Conference on
Conference_Location :
Ramanathapuram
Print_ISBN :
978-1-4244-7769-2
Type :
conf
DOI :
10.1109/ICCCCT.2010.5670557
Filename :
5670557
Link To Document :
بازگشت