A commutative digital image watermarking and encryption method in the tree structured Haar transform domain

In this paper a commutative watermarking and ciphering scheme for digital images is presented. The commutative property of the proposed method allows to cipher a watermarked image without interfering with the embedded signal or to watermark an encrypted image still allowing a perfect deciphering. Both operations are performed on a parametric transform domain: the Tree Structured Haar transform. The key dependence of the adopted transform domain increases the security of the overall system. In fact, without the knowledge of the generating key it is not possible to extract any useful information from the ciphered-watermarked image. Experimental results show the effectiveness of the proposed scheme.

[1]  Riccardo Scopigno,et al.  Image decomposition for selective encryption and flexible network services , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[2]  B.A. Assanovich Embedding bits in compressed data for selective encryption and watermarking , 2008, 2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering.

[3]  Andreas Uhl,et al.  SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .

[4]  Ahmad-Reza Sadeghi,et al.  Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.

[5]  Alessandro Neri,et al.  Secure access control to hidden data by biometric features , 2007, SPIE Defense + Commercial Sensing.

[6]  Francesco G. B. De Natale,et al.  An improved asymmetric watermarking scheme suitable for copy protection , 2006, IEEE Transactions on Signal Processing.

[7]  Amir Said Measuring the strength of partial encryption schemes , 2005, IEEE International Conference on Image Processing 2005.

[8]  Shiguo Lian,et al.  Commutative watermarking and encryption for media data , 2006 .

[9]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  Walter Geisselhardt,et al.  DIGITAL IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM : PERFORMANCE COMPARISON OF ERROR CORRECTION CODES , 2022 .

[11]  Ton Kalker,et al.  A Cryptographic Method for Secure Watermark Detection , 2006, Information Hiding.

[12]  Stefan Katzenbeisser,et al.  Watermark detection with zero-knowledge disclosure , 2003, Multimedia Systems.

[13]  S. Katzenbeisser,et al.  First Summary Report on Hybrid Systems , 2005 .

[14]  Neri Merhav On Joint Coding for Watermarking and Encryption , 2005, Information Hiding.

[15]  Stefan Katzenbeisser,et al.  Combining Tardos Fingerprinting Codes and Fingercasting , 2007, Information Hiding.

[16]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[17]  Bharat K. Bhargava,et al.  On the Design of Perceptual MPEG-Video Encryption Algorithms , 2005, IEEE Transactions on Circuits and Systems for Video Technology.

[18]  Andreas Uhl,et al.  Robustness against unauthorized watermark removal attacks via key-dependent wavelet packet subband structures , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[19]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[20]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[21]  Ingemar J. Cox,et al.  Watermarking Is Not Cryptography , 2006, IWDW.

[22]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[23]  Andreas Uhl,et al.  Selective encryption of wavelet-packet encoded image data: efficiency and security , 2003, Multimedia Systems.

[24]  Ioannis Pitas,et al.  Digital watermarking in the fractional Fourier transformation domain , 2001, J. Netw. Comput. Appl..

[25]  Stefan Katzenbeisser,et al.  Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[26]  Robert W. Shirey,et al.  Internet Security Glossary , 2000, RFC.

[27]  Kehar Singh,et al.  Double random fractional Fourier domain encoding for optical security , 2000 .

[28]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[29]  PitasIoannis,et al.  Digital watermarking in the fractional Fourier transformation domain , 2001 .

[30]  Jaakko Astola,et al.  Tree-Structured Haar Transforms , 2004, Journal of Mathematical Imaging and Vision.

[31]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[32]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[33]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[34]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[35]  Ahmad-Reza Sadeghi,et al.  The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection , 2008, IWDW.