Robust and hierarchical watermarking of encrypted images based on Compressive Sensing

We propose a method that allows watermarking encrypted image and detecting the watermark in encrypted domain or decrypted domain. First, image is divided into blocks and transformed to wavelet coefficients, and then scrambled with Arnold map and encrypted with Compressive Sensing. Next, watermark is embedded into the encrypted image using the Scalar Costa Scheme. The operations of watermark extraction and image decryption are commutative. The watermark can be extracted in the compressed encrypted domain and then the original image can be decrypted and reconstructed. In the other case, the image can be decrypted and the watermark can be extracted in the decrypted domain. The proposed method is compared with the-state-of-art methods, where its superiority in terms of robustness, high correct bit extraction rate, flexible data embedding capacity and hierarchical security are highlighted. An encryption method with the data embedding feature based on Compressive Sensing.The watermark can be detected into encrypted domain or decrypted domain.The operations of watermark extraction and image decryption are commutative.It has the properties of robustness against noise and hierarchical security.It has flexible data embedding capacity and high correct bit extraction rate.

[1]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[2]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[3]  Massimo Fornasier,et al.  Compressive Sensing , 2015, Handbook of Mathematical Methods in Imaging.

[4]  David K. Y. Yau,et al.  A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation , 2005, IEEE Transactions on Multimedia.

[5]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.

[6]  Shiguo Lian,et al.  Secure advanced video coding based on selective encryption algorithms , 2006, IEEE Trans. Consumer Electron..

[7]  Yao Zhao,et al.  Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[8]  Xinpeng Zhang,et al.  Commutative reversible data hiding and encryption , 2013, Secur. Commun. Networks.

[9]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  Mohan S. Kankanhalli,et al.  Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.

[11]  Michael B. Wakin,et al.  An Introduction To Compressive Sampling [A sensing/sampling paradigm that goes against the common knowledge in data acquisition] , 2008 .

[12]  G. Sharma,et al.  On the security and robustness of encryption via compressed sensing , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[13]  K. P. Soman,et al.  Secrecy of Cryptography with Compressed Sensing , 2012, 2012 International Conference on Advances in Computing and Communications.

[14]  Shiguo Lian,et al.  Commutative watermarking and encryption for media data , 2006 .

[15]  Li Dong,et al.  Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[16]  Zhirong Gao,et al.  Compressive Sampling with Coefficients Random Permutations for Image Compression , 2011, 2011 International Conference on Multimedia and Signal Processing.

[17]  Yao Zhao,et al.  LDFT-Based Watermarking Resilient to Local Desynchronization Attacks , 2013, IEEE Transactions on Cybernetics.

[18]  Mário A. T. Figueiredo,et al.  Gradient Projection for Sparse Reconstruction: Application to Compressed Sensing and Other Inverse Problems , 2007, IEEE Journal of Selected Topics in Signal Processing.

[19]  Chin-Chen Chang,et al.  A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing , 2014, Signal Process. Image Commun..

[20]  Aswin C. Sankaranarayanan,et al.  Compressive Sensing , 2008, Computer Vision, A Reference Guide.

[21]  K. P. Soman,et al.  A robust watermarking method based on Compressed Sensing and Arnold scrambling , 2012, 2012 International Conference on Machine Vision and Image Processing (MVIP).

[22]  Emmanuel J. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.

[23]  Guangming Shi,et al.  Compressive sensing-based multiple description image coding for wireless channel , 2010, 2010 International Conference on Wireless Communications & Signal Processing (WCSP).

[24]  Hong Sun,et al.  Compressive Sensing With Chaotic Sequence , 2010, IEEE Signal Processing Letters.

[25]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[26]  Gaurav Bhatnagar,et al.  Joint watermarking and encryption for still visual data , 2012, Multimedia Tools and Applications.

[27]  David L Donoho,et al.  Compressed sensing , 2006, IEEE Transactions on Information Theory.

[28]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[29]  Zhenxing Qian,et al.  Compressing Encrypted Image Using Compressive Sensing , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[30]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[31]  David K. Y. Yau,et al.  A Multi-key Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences : Theory , Design , and Implementation , 2005 .

[32]  Xiaochun Cao,et al.  High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation , 2016, IEEE Transactions on Cybernetics.

[33]  Hsiang-Cheh Huang,et al.  Watermarking for Compressive Sampling Applications , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[34]  Li-Hua Gong,et al.  Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing , 2014 .

[35]  Bernd Girod,et al.  Inverse mapping of SCS-Watermarked Data , 2002, 2002 11th European Signal Processing Conference.

[36]  David K. Y. Yau,et al.  A case for a multi-key secure video proxy: theory, design, and implementation , 2002, MULTIMEDIA '02.

[37]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted Images With Distributed Source Encoding , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[38]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[39]  Huiqian Du,et al.  Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain , 2014 .

[40]  Shiguo Lian,et al.  Quasi-commutative watermarking and encryption for secure media content distribution , 2009, Multimedia Tools and Applications.