Qu Changbo, Yang Xiaotao, Yuan Duoning. Zero-watermarking visual cryptography algorithm in the wavelet domain[J]. Journal of Image and Graphics, 2014, 19(3): 365-372. DOI: 10.11834/jig.20140304.
Traditional zero-watermarking algorithm requires characteristic image watermark data. Using these methods
it is often necessary to construct meaningless watermarks. Based on the existing visual cryptography robust watermarking algorithm
combined with zero-watermarking
we present a new visual cryptography zero wavelet domain zero watermarking algorithm. We need to embed the meaningful binary image into the original image
without changing the original image. A zero watermark is not only generated by the carrier image but it is co-produced with the visual watermark secret shares. The proposed algorithm generates two parts:one is the main map component(image feature information) and the other is the ownership chart parts(zero watermark). First of all
using the rational scrambling on the carrier image
it removes the pixel correlation. Second
doing the wavelet transform
the wavelet sub-bands are blocked and the singular value decomposition with each of the blocks is produced.After those steps
we compare each block's characteristic value and the mean value of each block. As a result of that
we can get the transition matrix. Third
the transition matrix is combined with a 2×2 visual secret sharing algorithm to generate the main sharing. Finally
by combining the main sharing with the secret watermarking information
we produce the proprietary sharing and save it to the certification center. Aiming at zero-watermarking information is not very intuitive
in the conditions of not making any changes to the carrier image
we could embed the meaningful binary image into the carrier image. Even in highly robust disturbance environment
this method also has a better performance than the traditional zero-watermarking algorithm. The presented zero-watermarking algorithm of image copyright authentication is a very reliable way to achieve our goals. As shown by our experiment
this algorithm has a good security. In addition to this aspect
it is also more robust when confronted with many different types of image processing.