Giter VIP home page Giter VIP logo

visual-cryptography-for-copyright-protection's Introduction

Digital Watermark for Copyright Protection of Digital Images

Introduction

The aim of this case study is to demonstrate a digital watermarking scheme using visual cryptography for copyright protection of a digital image. A binary image, called watermark, is split into two shares via a 2-out-of-2 visual secret sharing scheme. Then, one of the shares called the master share is extracted from the host image using a fixed pseudo-random points, and the other share also known as ownership share, made by relating the master share and the watermark, is held by the owner which is also given to an authorized 3rd party copyright verifier. Based on the security property of visual cryptography, the two shares on their own cannot leak any information about the watermark. The experimental results show that even after the image was modified, the invisible watermark was successfully extracted from it.

Theory

Visual Cryptography may be a special encryption technique to cover information in images in such a way that it is decrypted by the human vision if the proper key image is employed. The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images. One image contains random pixels and also the other image contains the key information. it's impossible to retrieve the key information from one in every one of the pictures. Either transparent images or layers are required to reveal the data. the best thanks to implementing Visual Cryptography is to print the 2 layers onto a transparent sheet.
There is a simple algorithm for visual cryptography that creates 2 encrypted images from an original unencrypted image. The algorithm is as follows:

  1. Create an image of random pixels the same size and shape as the original image. Random1.
  2. Create a second image whose pixels are the exclusiveor (XOR) of the first image and the original image.
    Random2 = Random1 XOR Original.
    This image will "look random".
  3. The two apparently random images can now be combined with XOR to re-create the original image.
    Random1 XOR Random2 = Original

How to run

There is no special requirements for this project. The flow of the project will be as given below:

  1. 'python owernership_share_generator.py' will generate the Ownership share for our image and watermark.
  2. 'python master_share_generator.py' will generate all the Master shares for each of the sample stolen and modified images.
  3. 'python watermark_generator.py' will extract watermarks using the Ownership share with each of the master shares.
  4. 'python template_match_res.py' will give the accuracy of extracted watermark.


The results will be saved im the images folder.

visual-cryptography-for-copyright-protection's People

Contributors

shikhar0051 avatar

Stargazers

 avatar  avatar  avatar

Watchers

 avatar

Forkers

pqtrung5th1

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.