Abstract
We propose a new approach to commutative watermarking-encryption (CWE). A permutation cipher is used to encrypt the multimedia data, which leaves the global statistics of the multimedia data intact. Therefore, any non-localized watermarking scheme that depends only on global statistics of the multimedia data can be combined with the permutation cipher to form a CWE scheme. We demonstrate this approach by giving a concrete implementation, which manipulates the global histogram to achieve watermark embedding/detection.
Chapter PDF
References
Herrera-Joancomartí, J., Katzenbeisser, S., Megías, D., Minguillón, J., Pommer, A., Steinebach, M., Uhl, A.: ECRYPT European Network of Excellence in Cryptology, first summary report on hybrid systems, D.WVL.5 (2005)
Lian, S.: Multimedia Content Encryption. CRC Press (2009)
Lian, S.: Quasi-commutative watermarking and encryption for secure media content distribution. Multimedia Tools and Applications 43, 91–107 (2009)
Lian, S., Liu, Z., Zhen, R., Wang, H.: Commutative watermarking and encryption for media data. Optical Engineering 45(8) (2006)
Battisti, F., Cancellaro, M., Boato, G., Carli, M., Neri, A.: Joint watermarking and encryption of color images in the Fibonacci-Haar domain. EURASIP J. Advances in Signal Processing 2009, Article ID 938515 (2009)
Boato, G., Conotter, V., DeNatale, F.G.B., Fontanari, C.: A joint asymmetric watermarking and image encryption scheme. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Proc. SPIE, vol. 6819, p. 68191A (2008)
Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits and Systems for Video Technology 16(3), 354–361 (2006)
Coltuc, D., Bolon, P.: Robust watermarking by histogram specification. In: Proc. 1999 Int. Conf. Image Processing (ICIP 1999), vol. 2, pp. 236–239 (1999)
Chareyron, G., Coltuc, D., Trémeau, A.: Watermarking and authentication of color images based on segmentation of the xyY color space. J. Imaging Science and Technology 50(5), 411–423 (2006)
Roy, S., Chang, E.C.: Watermarking color histograms. In: Proc. 2004 Int. Conf. Image Processing (ICIP 2004), pp. 2191–2194 (2004)
Lin, C.H., Chan, D.Y., Su, H., Hsieh, W.S.: Histogram-oriented watermarking algorithm: colour image watermarking scheme robust against geometric attacks and signal processing. IEE Proc. Vision, Image and Signal Processing 153(4), 483–492 (2006)
Chrysochos, E., Fotopoulos, V., Skodras, A.N., Xenos, M.: Reversible image watermarking based on histogram modification. In: Proc. 11th Panhellenic Conf. Informatics (PCI 2007), pp. 93–104 (2007)
Chen, C., Ni, J., Huang, J.: Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 81–95. Springer, Heidelberg (2009)
Gaubatz, M.: MeTriX MuX visual quality assessment package, http://foulard.ece.cornell.edu/gaubatz/metrix_mux
Slater, J.: Scrambler: TV signal encryption. Electronics Today Int (ETI) 19, 16–20 (1990)
Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. Multimedia 5(1), 118–129 (2003)
Li, S., Li, C., Chen, G., Bourbakis, N.G., Lo, K.T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing: Image Communication 23(3), 212–223 (2008)
Knuth, D.: The Art of Computer Programming, Volume 3: Sorting and Searching, 2nd edn. Addison-Wesley (1998)
Arnold, V.I., Avez, A.: Ergodic Problems of Classical Mechanics. Benjamin (1968)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos 8, 1259–1284 (1998)
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 21(3), 749–761 (2004)
Hadjidemetriou, E., Grossberg, M.D., Nayar, S.K.: Histogram preserving image transformations. Int. J. Computer Vision 45(1), 5–23 (2001)
Zhang, X.: Lossy compression and iterative reconstruction for encrypted image. IEEE Trans. Information Forensics and Security 6(1), 53–58 (2011)
Dyson, F.J., Falk, H.: Period of a discrete cat mapping. The American Mathematical Monthly 99(7), 603–614 (1992)
Wong, K.-W.: Image encryption using chaotic maps. In: Kocarev, L., Galias, Z., Lian, S. (eds.) Intelligent Computing Based on Chaos. SCI, vol. 184, pp. 333–354. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Schmitz, R., Li, S., Grecos, C., Zhang, X. (2012). A New Approach to Commutative Watermarking-Encryption. In: De Decker, B., Chadwick, D.W. (eds) Communications and Multimedia Security. CMS 2012. Lecture Notes in Computer Science, vol 7394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32805-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-32805-3_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32804-6
Online ISBN: 978-3-642-32805-3
eBook Packages: Computer ScienceComputer Science (R0)