Energy efficient watermarking on mobile devices using proxy-based partitioning

Digital watermarking embeds an imperceptible signature or watermark in a digital file containing audio, image, text, or video data. The watermark can be used to authenticate the data file and for tamper detection. It is particularly valuable in the use and exchange of digital media, such as audio and video, on emerging handheld devices. However, watermarking is computationally expensive and adds to the drain of the available energy in handheld devices. In this paper, we first analyze the energy profile of various watermarking algorithms. We also study the impact of security and image quality on energy consumption. Second, we present an approach in which we partition the watermarking embedding and extraction algorithms and migrate some tasks to a proxy server. This leads to a lower energy consumption on the handheld without compromising the security of the watermarking process. Experimental results show that executing the watermarking tasks that are partitioned between the proxy and the handheld devices, reduces the total energy consumed by 80%, and improves performance by two orders of magnitude compared to running the application on only the handheld device

[1]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[2]  Ton Kalker,et al.  Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.

[3]  James M. Rehg,et al.  Compiler-Directed Remote Task Execution for Power Management , 2000 .

[4]  B. Clifford Neuman,et al.  Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.

[5]  Massoud Pedram,et al.  Extending the lifetime of a network of battery-powered mobile devices by remote processing: a Markovian decision-based approach , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).

[6]  Srivaths Ravi,et al.  Analyzing the energy consumption of security protocols , 2003, ISLPED '03.

[7]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[8]  Andreas Uhl,et al.  Protection of wavelet-based watermarking systems using filter parametrization , 2003, Signal Process..

[9]  Srinivas Devadas,et al.  Proxy-based security protocols in networked mobile devices , 2002, SAC '02.

[10]  Adeel Mumtaz,et al.  Digital Image Watermarking in the Wavelet Transform Domain , 2008 .

[11]  I. Daubechies Orthonormal bases of compactly supported wavelets , 1988 .

[12]  Jeffrey I. Schiller,et al.  An Authentication Service for Open Network Systems. In , 1998 .

[13]  Srivaths Ravi,et al.  Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..

[14]  Jong Ryul Kim,et al.  A robust wavelet-based digital watermarking using level-adaptive thresholding , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[15]  Ming-Feng Chen,et al.  iMobile: a proxy-based platform for mobile services , 2001, WMI '01.

[16]  Oscar Esparza,et al.  Protecting mobile agents by using traceability techniques , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..

[17]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[18]  Ja-Ling Wu,et al.  Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[19]  Armando Fox,et al.  Security on the move: indirect authentication using Kerberos , 1996, MobiCom '96.

[20]  Jessica Fridrich Combining low-frequency and spread-spectrum watermarking , 1998, Optics & Photonics.

[21]  Akihiro Yamamoto,et al.  A digital watermark based on the wavelet transform and its robustness on image compression , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[22]  Lintian Qiao,et al.  Multimedia Security and Copyright Protection , 1998 .

[23]  Narendra Ahuja,et al.  A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[24]  Gonzalo R. Arce,et al.  Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[25]  F. Perez-Gonzalez,et al.  A tutorial on digital watermarking , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[26]  Do Van Thanh Security Issues in Mobile eCommerce , 2000, EC-Web.

[27]  Geoffrey H. Kuenning,et al.  The remote processing framework for portable computer power saving , 1999, SAC '99.

[28]  X G Xia,et al.  Wavelet transform based watermark for digital images. , 1998, Optics express.

[29]  Daniel Duchamp,et al.  A proxy-based filtering mechanism for the mobile environment , 1998 .

[30]  Ioannis Pitas,et al.  Embedding robust watermarks by chaotic mixing , 1997, Proceedings of 13th International Conference on Digital Signal Processing.

[31]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[32]  H J Wang,et al.  Wavelet-based digital image watermarking. , 1998, Optics express.

[33]  Zixiang Xiong,et al.  Multiresolution watermarking for images and video: a unified approach , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[34]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.