Digital fingerprinting for color images based on the quaternion encryption scheme

In this paper we present a new quaternion-based encryption technique for color images. In the proposed encryption method, images are written as quaternions and are rotated in a three-dimensional space around another quaternion, which is an encryption key. The encryption process uses the cipher block chaining (CBC) mode. Further, this paper shows that our encryption algorithm enables digital fingerprinting as an additional feature. This feature follows from some artifacts which occur in the decrypted image. These artifacts can be maintained at such a low level that they remain imperceptible to the human eye and unique for each key. These artifacts are considered to be users' fingerprints and can be used to identify pirates in the event of illegal redistribution of multimedia data. Identification of pirates is performed in the form of non-blind detection. The purpose of this paper is to report a new approach to digital fingerprinting and to point out the method's existing flaws which need future research. A computer-based simulation was conducted to examine the potential of our quaternion encryption scheme for the implementation of digital fingerprinting.

[1]  Ahmad-Reza Sadeghi,et al.  Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages , 2006, ACISP.

[2]  Heung-Kyu Lee,et al.  Perceptually tuned robust watermarking scheme for digital images , 2000, Pattern Recognit. Lett..

[3]  Ron Goldman,et al.  Understanding quaternions , 2011, Graph. Model..

[4]  Deepak Kedia Comparative Analysis of Peak Correlation Characteristics of Non-Orthogonal Spreading Codes for Wireless Systems , 2012, ArXiv.

[5]  Renu Dhir,et al.  Joint watermarking and fingerprinting approach for colored digital images in double DCT domain , 2013, 2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC).

[6]  Malay Kumar Kundu,et al.  Robust SS watermarking with improved capacity , 2007, Pattern Recognit. Lett..

[7]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..

[8]  N. Ahmed,et al.  Discrete Cosine Transform , 1996 .

[9]  Roland Parviainen,et al.  Large Scale distributed watermarking of multicast media through encryption , 2001, Communications and Multimedia Security.

[10]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[11]  Min Wu,et al.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.

[12]  Min Wu,et al.  Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.

[13]  Stefan Katzenbeisser,et al.  Combining Tardos Fingerprinting Codes and Fingercasting , 2007, Information Hiding.

[14]  R. Koide,et al.  A new quadripartite public-key cryptosystem , 2004, IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004..

[15]  K. J. Ray Liu,et al.  Bandwidth efficient fingerprint multicast for video streaming , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[16]  Girija Chetty,et al.  A novel image watermarking scheme using Extreme Learning Machine , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).

[17]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[18]  Tomoyuki Nagase,et al.  Secure signals transmission based on quaternion encryption scheme , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[19]  Girija Chetty,et al.  Blind Video Tamper Detection Based on Fusion of Source Features , 2011, 2011 International Conference on Digital Image Computing: Techniques and Applications.

[20]  S. Welstead Fractal and Wavelet Image Compression Techniques , 1999 .

[21]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[22]  Yulin Wang,et al.  Blind image data hiding based on self reference , 2004, Pattern Recognit. Lett..

[23]  K. J. Ray Liu,et al.  Multimedia Fingerprinting Forensics for Traitor Tracing , 2005 .

[24]  Mostafa H. Ammar,et al.  WHIM: watermarking multicast video with a hierarchy of intermediaries , 2002, Comput. Networks.

[25]  Charalampos Manifavas,et al.  Chameleon - A New Kind of Stream Cipher , 1997, FSE.

[26]  Vidhyacharan Bhaskar,et al.  Real-Time Symmetric Cryptography using Quaternion Julia Set , 2009 .

[27]  Min Wu,et al.  Collusion-resistant fingerprinting for multimedia , 2004 .

[28]  William Kahan,et al.  Lecture Notes on the Status of IEEE Standard 754 for Binary Floating-Point Arithmetic , 1996 .

[29]  Ron Goldman,et al.  An Integrated Introduction to Computer Graphics and Geometric Modeling , 2009 .