Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/423544
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2022-12-09T07:17:40Z-
dc.date.available2022-12-09T07:17:40Z-
dc.identifier.urihttp://hdl.handle.net/10603/423544-
dc.description.abstractThe existing image watermarking schemes protect the digital image by embedding watermark that degrades the visual quality of the image. This embedded watermark is extracted to prove the copyright or authentication. Visual Cryptography based watermarking schemes have gained a lot of attention in recent years since they aid in protecting the images without modifying them. The focus of this thesis is on two key uses of watermarking, namely copyright protection and authentication. Most of the existing Visual Cryptography based image authentication schemes have high computational cost as they embed the constructed shares and authentication data into the cover images. Most of these schemes create expanded and noisy shares, leading to pixel expansion and security threat of some sensitive information being shared, respectively. To address these problems, an imperceptible authentication scheme is introduced for grey images where meaningful and un-expanded authentication shares are generated from watermark and cover images. Cellular Automata is used to construct the master share that provides self-construction capacity to the share, thereby saving the storage cost and enhancing stability. The watermark is recovered just by superimposing these authentication shares, thereby helping to reduce the computational cost at receiver s side. The scheme possesses the ability of tamper detection, localization and lossless recovery as of the tampered data as well. The copyright protection schemes are proposed to protect the ownership of the digital images. Most of the existing copyright protection schemes based on visual cryptography produce noisy shares that is a security threat. For this purpose, a robust and secure copyright protection scheme based on curvelet transform, K-means clustering and extended visual cryptography for color images is proposed that creates meaningful noiseless shares. The scheme is robust to withstand a range of image manipulation attacks and provide greater imperceptibility.
dc.format.extent144p.
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleDevelopment of Copyright Protection and Authentication Schemes with Extended Visual Cryptography
dc.title.alternative
dc.creator.researcherKukreja, Sonal
dc.subject.keywordComputer Science
dc.subject.keywordCryptography
dc.subject.keywordData encryption (Computer science)
dc.subject.keywordEngineering and Technology
dc.subject.keywordImaging Science and Photographic Technology
dc.description.note
dc.contributor.guideKasana, Singara Singh and Kasana, Geeta
dc.publisher.placePatiala
dc.publisher.universityThapar Institute of Engineering and Technology
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.date.registered
dc.date.completed2021
dc.date.awarded2021
dc.format.dimensions
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File62.12 kBAdobe PDFView/Open
02_prelim pages.pdf704.61 kBAdobe PDFView/Open
03_content.pdf83.2 kBAdobe PDFView/Open
04_abstract.pdf62.24 kBAdobe PDFView/Open
05_chapter 1.pdf1.21 MBAdobe PDFView/Open
06_chapter 2.pdf669.45 kBAdobe PDFView/Open
07_chapter 3.pdf7.65 MBAdobe PDFView/Open
08_chapter 4.pdf4.42 MBAdobe PDFView/Open
09_chapter 5.pdf2.29 MBAdobe PDFView/Open
10_chapter 6.pdf2.17 MBAdobe PDFView/Open
11_chapter 7.pdf86.32 kBAdobe PDFView/Open
12annexures.pdf132.68 kBAdobe PDFView/Open
80_recommendation.pdf107.3 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: