Visual Cryptography
Visual Cryptography
Images
Azzam SLEIT (Previously, Azzam IBRAHIM)
King Abdullah II School for Information Technology, University of Jordan,
Amman, Jordan
and
Adel ABUSITTA
King Abdullah II School for Information Technology, University of Jordan,
Amman, Jordan
Watermarked
Data Digital Data
Watermarking
First, the owner must select a secret key S of length 8...128 byte. 1. Replace F with its similar image in Mg and Repeat
The key must be a multiple of 8 bytes and will be expanded to steps from 1 to 5 of the embedding process (use VK
PK, where PK is the length of the watermark pattern as we will which is the length of the verification information
see later. The expanding algorithm is as follows: instead of PK and generation information of the key
as VK instead of PK). Then create array X from F to
1. Let S[i] be the i-th byte of the original key, Se[i] the i- be used along with the extended key Se.
th byte of the expanded key, and K the length of S. 2. Generate the watermark pattern P' according to the
2. Load the key S without change into the first K bytes following:
of Se. For i = 1 to VK
3. For i = K+1 to PK P'[i] = (V[i] XOR Se[i] XOR X1[i] XOR X2[i]
Se[i] = (Se[i-8] XOR Se[i-4] XOR XOR ….. XOR Xn[i])
Se[i-3] XOR Se[i-1]) <<< 3 3. If P' is equal to the original watermark pattern P, then
F is a copy of Mi (in case F is a copy of Mi with minor
Then, the owner should select a watermark pattern P which can changes then the changes will appear on P' as some
be any significant bitmap image. Consequently, the owner can distortions).
typify a group image Mg using the watermark pattern and the
expanded key Se according to the following steps for each Mi In summary, the proposed method calls for sorting the input
where i = 1, 2, ….n. group images. The algorithm takes the sorted image as input to
generate verification information instead of the original image.
1. Let PK be the length of the watermark pattern P, MKi Also, it is obvious that the watermark pattern is restored
the length of the image Mi, and MKi' the length of the successfully if no change occurs to any member in the group.
image Mi' which will be equal to MKi/8 as we will see This is because the embedding and verification processes are the
below.
Colored pattern
Colored Pattern