Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms

Invariant Commutative Watermarking-Encryption means to use a cipher that does not have any impact on a certain feature space, which can thus be used for embedding watermarks either before or after encryption. For example, histogram-based watermarking schemes are invariant to pixel permutations and can be combined with permutation-based ciphers to form a Commutative Watermarking-Encryption (CWE) scheme. However, typical histogram-based watermarking schemes based on comparison of histogram bins are prone to de-synchronization attacks, where the whole histogram is shifted by a certain amount. In this paper the authors investigate the possibility to avoid this kind of attacks by synchronizing the embedding and detection processes, using the mean of the histogram as a calibration point. The resulting watermarking scheme is resistant to three common types of shifts of the histogram, while the advantages of previous histogram-based schemes, especially commutativity of watermarking and permutation-based encryption, are preserved. The authors also report on the results of testing robustness of the scheme against JPEG and JPEG2000 compression.

[1]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[2]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[3]  Zhengquan Xu,et al.  On the provably secure CEW based on orthogonal decomposition , 2014, Signal Process. Image Commun..

[4]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[5]  Xinpeng Zhang,et al.  Towards More Robust Commutative Watermarking-Encryption of Images , 2013, 2013 IEEE International Symposium on Multimedia.

[6]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[7]  C. Lin,et al.  Histogram-oriented watermarking algorithm: colour image watermarking scheme robust against geometric attacks and signal processing , 2006 .

[8]  Jiwu Huang,et al.  Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping , 2009, IWDW.

[9]  Dinu Coltuc,et al.  Robust watermarking by histogram specification , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[10]  A. Skodras,et al.  Reversible Image Watermarking Based on Histogram Modification , 2007 .

[11]  Shiguo Lian,et al.  Quasi-commutative watermarking and encryption for secure media content distribution , 2009, Multimedia Tools and Applications.

[12]  Jiwu Huang,et al.  Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Shiguo Lian,et al.  Commutative watermarking and encryption for media data , 2006 .

[14]  Ee-Chien Chang,et al.  Watermarking color histograms , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[15]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[16]  Xinpeng Zhang,et al.  A New Approach to Commutative Watermarking-Encryption , 2012, Communications and Multimedia Security.

[17]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[18]  Rik Van de Walle,et al.  End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation , 2013, IEEE Signal Process. Mag..