Open Access Open Access  Restricted Access Subscription or Fee Access

Watermarking of Compressed and Encrypted JPEG Images

V. Banupriya, P. Beril Jasmine

Abstract


In this project, a robust watermarking can be added to the compressed and encrypted JPEG images. For applicative purpose digital asset management systems (DAMS) generally handles media data in a compressed and encrypted form. And sometimes it is necessary to watermark this compressed encrypted image items in the compressed-encrypted domain itself for tamper detection or ownership declaration or copyright management purpose. It is difficult to watermark these compressed encrypted streams as the compression process would have packed the information of raw media into a low number of bits and encryption would have randomized the compressed bit stream. Attempting to watermark such a randomized bit streams can cause a dramatic degradation of the media quality. Thus it is necessary to choose an encryption scheme that is both secure and will allow watermarking in a predictable manner in the compressed encrypted domain. In this project, a robust watermarking algorithm is proposed to watermark JPEG compressed and encrypted images. The encryption algorithm we propose to use is a stream cipher. While the proposed technique embeds watermark in the compressed-encrypted domain, the extraction of watermark can be done in the decrypted domain.

Keywords


Image Encryption, Watermarking.

Full Text:

PDF

References


[1].A.V.Subramanyam, Sabu Emmanuel, “Robust Watermarking of compressed and encrypted JPEG2000 images” IEEE Trans pp 703-716,2012

S. Hwang, K. Yoon,K. Jun, andK. Lee, “Modeling and implementation of digital rights,” J. Syst. Softw., vol. 73, no. 3, pp. 533–549, 2004.

A. Sachan, S. Emmanuel, A. Das, and M.S. Kankanhalli, “Privacy Preserving multiparty multilevel lDRM architecture,” in Proc. 6th IEEE Consumer Communications and Networking Conf., Workshop Digital Rights Management, 2009, pp. 1–5.

T. Thomas, S. Emmanuel, A. Subramanyam, and M. Kankanhalli, “Joint watermarking scheme for multiparty multilevel DRM architecture,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 758–767,

A. Subramanyam, S. Emmanuel, and M. Kankanhalli, “Compressedencrypted domain JPEG2000 image watermarking,” in Proc. IEEE Int. Conf. Multimedia and Expo, 2010, pp. 1315–1320.

H. Wu and D.Ma, “Efficient and secure encryption schemes for JPEG 2000,” in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, 2004, vol. 5, pp. 869– 872.

M. Deng, T. Bianchi,A. Piva, and B. Preneel, “An efficient buyer-seller watermarking protocol based on composite signal representation,” in Proc. 11th ACM Workshop Multimedia and Security, 2009, pp. 9–18.

T. Bianchi, A. Piva, and M. Barni, “Composite signal representation for fast and storage-efficient processing of encrypted signals,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180– 187, Mar. 2010.

A. Subramanyam, S. Emmanuel, and M. Kankanhalli, “Compressedencrypted domain JPEG2000 image watermarking,” in Proc. IEEE Int. Conf. Multimedia and Expo, 2010, pp. 1315–1320.

H. Wu and D.Ma, “Efficient and secure encryption schemes for JPEG 2000,” in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, 2004, vol. 5, pp. 869– 872.

M. Deng, T. Bianchi,A. Piva, and B. Preneel, “An efficient buyer-seller watermarking protocol based on composite signal representation,” in Proc. 11th ACM Workshop Multimedia and Security, 2009, pp. 9–18.

T. Bianchi, A. Piva, and M. Barni, “Composite signal representation for fast and storage-efficient processing of encrypted signals,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180– 187, Mar. 2010.

S. Lian, Z. Liu, R. Zhen, and H. Wang, “Commutative watermarking and encryption for media data,” Opt. Eng., vol. 45, pp. 1–3, 2006.

F. Battisti, M. Cancellaro, G. Boato, M. Carli, and A. Neri, “Joint watermarking and encryption of color images in the Fibonacci-Haar domain,” EURASIP J. Adv. Signal Process. vol. 2009.

M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. De Natale, and A. Neri, “A joint digital watermarking and encryption method,” in Proc. SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 2008, vol. 6819, pp. 68 191C–68 191C.

J. Prins, Z. Erkin, and R. Lagendijk, “Anonymous fingerprinting with robust QIM watermarking techniques,” EURASIP J. Inf. Security, vol. 2007.

Z. Li, X. Zhu, Y. Lian, and Q. Sun, “Constructing secure content dependent watermarking scheme using homomorphic


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.