英文摘要 |
Computer and communication technology has increased the transmission and exchange of digital data and created an environment in which digital information is easy to spread, copy, and modify, necessitating effective copyright protection techniques. Previous watermark studies have used only binary, grayscale, or a four-color images for visual cryptography. In this study, the RGB colorwatermark was embedded into a grayscale image based on (2, 2) threshold secret-sharing schemes. We propose two strategies: combining binarzation and toral automorphism, and combining “neighboring relations” and toral automorphism. In the experiment, the attack resilience was evaluated it contained 10% clipping, 20% clipping, 30% clipping, blurring, noise, sharpening, scaling, JPEG QF = 90, JPEG QF = 50, and JPEG QF = 10. The neighbor relations approach reduces the destruction of the image that is embedded information. The watermark NCs under 10% clipping and 20% clipping attacks were 0.857 and 0.808, and the remaining NCs exceeded 0.934. Finally, we added horizontal/vertical distortions and rotation attack to the experiment. The results show that the proposed method effectively resists horizontal/vertical distortion and rotation attacks below 15°. |