An optimal approach for watermarking using MRC4 encryption scheme

As there is rapid revolution in digital multimedia which is in compressed encrypted format, the ability for creating similar and unauthorized data, that can be easily copied, manipulated and distributed has been increased. Hence for copyright management protection, ownership identification, tamper detection and for other security issues watermarking has to be carried out for tamper proofing, quality assessment and copy control for those media content. Thus there is a need for an encryption scheme which could provide security as well as allow us to watermarking these compressed encrypted data. For encryption we propose a stream cipher called Modified Rivest Cipher 4 that overcome several weaknesses of the RC4. The embedding capacity, robustness, perceptual quality and security of the proposed algorithm, using the watermarking schemes: spread spectrum, scalar costa scheme quantization index modulation has been proposed and the comparison based on PSNR, MSE and BER values has been done between various encryption algorithms.

[1]  Kenji Yoshigoe,et al.  RC4-2S: RC4 Stream Cipher with Two State Tables , 2013, ITCS.

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  Zekeriya Erkin,et al.  Anonymous Fingerprinting with Robust QIM Watermarking Techniques , 2007, EURASIP J. Inf. Secur..

[4]  Thomas Stütz,et al.  A survey on JPEG2000 encryption , 2009, Multimedia Systems.

[5]  Alessandro Neri,et al.  A joint digital watermarking and encryption method , 2008, Electronic Imaging.

[6]  Mohan S. Kankanhalli,et al.  Privacy Preserving Multiparty Multilevel DRM Architecture , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[7]  Mauro Barni,et al.  Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.

[8]  Ahmet M. Eskicioglu,et al.  Robust DWT-SVD domain image watermarking: embedding data in all frequencies , 2004, MM&Sec '04.

[9]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[10]  Mohan S. Kankanhalli,et al.  Compressed-encrypted domain JPEG2000 image watermarking , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[11]  Zhi Li,et al.  Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[12]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[13]  NeriAlessandro,et al.  Joint watermarking and encryption of color images in the Fibonacci-Haar domain , 2009 .

[14]  Alessandro Piva,et al.  An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.

[15]  Shih-Fu Chang,et al.  A quantitative semi-fragile JPEG2000 image authentication system , 2002, Proceedings. International Conference on Image Processing.

[16]  Hongjun Wu,et al.  Efficient and secure encryption schemes for JPEG2000 , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[17]  Xiaolong Li,et al.  Efficient Generalized Integer Transform for Reversible Watermarking , 2010, IEEE Signal Processing Letters.

[18]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[19]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[20]  Shiguo Lian,et al.  Commutative watermarking and encryption for media data , 2006 .

[21]  Mohan S. Kankanhalli,et al.  A dual watermarking technique for images , 1999, MULTIMEDIA '99.

[22]  Seong Oun Hwang,et al.  Modeling and implementation of digital rights , 2004, J. Syst. Softw..

[23]  Brahmjit Singh,et al.  Performance analysis of modified RC4 encryption algorithm , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).

[24]  Alessandro Neri,et al.  Joint Watermarking and Encryption of Color Images in the Fibonacci-Haar Domain , 2009, EURASIP J. Adv. Signal Process..

[25]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[26]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[27]  Mohan S. Kankanhalli,et al.  Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.