Data bits from text are embedded to some suitable nonlinear pixel and bit positions about the entire image through the key. After that, we have divided that image into three logical regions vertically. Also, the key is divided into three different blocks by digits. Taking adjacent two of three logical regions we have formed three shares for both image and key. Each share of key is assigned to each and every shares of image. Out of those three shares only addition of any two is able to make the full image. Also through appropriate arrangement of shares of keys we can retrieve that hidden data bits from watermarked image and reform into its original content.
Samanta, Sabyasachi and Dutta, Saurabh
"Implementation of Invisible Digital Watermarking on Image using Permutation of Key and Image Shares,"
International Journal of Computer and Communication Technology: Vol. 3
, Article 13.
Available at: https://www.interscience.in/ijcct/vol3/iss1/13