Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy

Content-fragile commutative watermarking-encryption requires that both the content-fragile image signature and the watermarking process are invariant under encryption. The pixel entropy, being dependent on first-order image statistics only, is invariant under permutations. In the present paper we embed semi-fragile signatures based on pixel entropy by using a histogram-based watermarking algorithm, which is also invariant to permutations. We also show how the problem of collisions, i.e. different images having the same signature, can be overcome in this approach, if embedder and encryptor share a common secret.

[1]  Jianting Guo,et al.  Secure watermarking scheme against watermark attacks in the encrypted domain , 2015, J. Vis. Commun. Image Represent..

[2]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[3]  Hichem Sahbi,et al.  Using entropy for image and video authentication watermarks , 2006, Electronic Imaging.

[4]  A. Skodras,et al.  Reversible Image Watermarking Based on Histogram Modification , 2007 .

[5]  Alessandro Neri,et al.  Joint Watermarking and Encryption of Color Images in the Fibonacci-Haar Domain , 2009, EURASIP J. Adv. Signal Process..

[6]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[7]  Shiguo Lian,et al.  Quasi-commutative watermarking and encryption for secure media content distribution , 2009, Multimedia Tools and Applications.

[8]  Xinpeng Zhang,et al.  A New Approach to Commutative Watermarking-Encryption , 2012, Communications and Multimedia Security.

[9]  Francesco G. B. De Natale,et al.  A joint asymmetric watermarking and image encryption scheme , 2008, Electronic Imaging.

[10]  Xinpeng Zhang,et al.  Towards More Robust Commutative Watermarking-Encryption of Images , 2013, 2013 IEEE International Symposium on Multimedia.

[11]  Stefan Katzenbeisser,et al.  Secure Watermark Embedding Through Partial Encryption , 2006, IWDW.

[12]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.