Secure watermarking scheme against watermark attacks in the encrypted domain

We have proposed a robust watermarking scheme in the encrypted domain.For traditional schemes, original media could be exposed to the embedder.The robustness of watermark in the encrypted domain should be taken into account.We investigate the watermark attacks that can be performed in the encrypted domain.Our watermarking scheme would be helpful for copyright protection in the cloud. The homomorphic cryptosystems create a great opportunity for secure signal processing (SSP). Watermarking in the encrypted domain provides a promising solution to the security of watermarking. However, the robust performance of the watermarking scheme in the encrypted domain should be carefully considered. In this paper, we propose a robust watermarking scheme in the encrypted domain, which protects the original images from the third party embedders. The hybrid discrete wavelet transform (DWT) and discrete cosine transform (DCT) based method improves the robust performance of the encrypted domain watermarking scheme. The watermark extraction can be performed on both the plaintext and the encrypted domains. We also give an estimation of the expanding factor after watermark embedding in the encrypted domain. At last, we discuss the watermark attacks that are available in the encrypted domain. Taking Haar wavelet transform for example, we conduct the experiments on the visual quality and the robustness of our watermarking scheme, which demonstrate that the entire performance is satisfactory.

[1]  Xuelong Li,et al.  A local Tchebichef moments-based robust image watermarking , 2009, Signal Process..

[2]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[3]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[4]  Stefan Katzenbeisser,et al.  A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[5]  Mauro Barni,et al.  On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.

[6]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[7]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[8]  Ching-Yung Lin,et al.  Recommendation in the end-to-end encrypted domain , 2011, CIKM '11.

[9]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[10]  Mauro Barni,et al.  eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.

[11]  Peijia Zheng,et al.  Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.

[12]  Xiang-Yang Wang,et al.  A Novel Synchronization Invariant Audio Watermarking Scheme Based on DWT and DCT , 2006, IEEE Transactions on Signal Processing.

[13]  Minoru Kuribayashi,et al.  Fingerprinting protocol for images based on additive homomorphic property , 2005, IEEE Transactions on Image Processing.

[14]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[15]  Guy Gogniat,et al.  Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain , 2013, IEEE Signal Processing Magazine.

[16]  Xuelong Li,et al.  Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[17]  Craig Gentry,et al.  (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.

[18]  Ivan Damgård,et al.  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.

[19]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[20]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[21]  Mauro Barni,et al.  Efficient pointwise and blockwise encrypted operations , 2008, MM&Sec '08.

[22]  Alessandro Piva,et al.  An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.

[23]  Xinpeng Zhang,et al.  A New Approach to Commutative Watermarking-Encryption , 2012, Communications and Multimedia Security.

[24]  Ralph Bernstein,et al.  Digital Image Processing of Earth Observation Sensor Data , 1976, IBM J. Res. Dev..

[25]  Ee-Leng Tan,et al.  Robust SVD-Based Audio Watermarking Scheme With Differential Evolution Optimization , 2013, IEEE Transactions on Audio, Speech, and Language Processing.

[26]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..

[27]  Mauro Barni,et al.  Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.

[28]  Peijia Zheng,et al.  Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking , 2012, Information Hiding.

[29]  Mauro Barni,et al.  Encrypted Domain DCT Based on Homomorphic Cryptosystems , 2009, EURASIP J. Inf. Secur..

[30]  Stéphane Mallat,et al.  A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[31]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[32]  Shiguo Lian,et al.  Commutative watermarking and encryption for media data , 2006 .

[33]  Bart Preneel,et al.  A Privacy-Preserving Buyer–Seller Watermarking Protocol Based on Priced Oblivious Transfer , 2011, IEEE Transactions on Information Forensics and Security.

[34]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[35]  Xiangyang Wang,et al.  A New Adaptive Digital Audio Watermarking Based on Support Vector Regression , 2007, IEEE Transactions on Audio, Speech, and Language Processing.

[36]  Yan Lin,et al.  A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression , 2003, IEEE Trans. Circuits Syst. Video Technol..

[37]  Ahmad-Reza Sadeghi,et al.  Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.

[38]  Vincenzo Piuri,et al.  A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[39]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.