Abstract
We propose a new approach to commutative watermarking-encryption (CWE). A permutation cipher is used to encrypt the multimedia data, which leaves the global statistics of the multimedia data intact. Therefore, any non-localized watermarking scheme that depends only on global statistics of the multimedia data can be combined with the permutation cipher to form a CWE scheme. We demonstrate this approach by giving a concrete implementation, which manipulates the global histogram to achieve watermark embedding/detection.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Herrera-JoancomartÃ, J., Katzenbeisser, S., MegÃas, D., Minguillón, J., Pommer, A., Steinebach, M., Uhl, A.: ECRYPT European Network of Excellence in Cryptology, first summary report on hybrid systems, D.WVL.5 (2005)
Lian, S.: Multimedia Content Encryption. CRC Press (2009)
Lian, S.: Quasi-commutative watermarking and encryption for secure media content distribution. Multimedia Tools and Applications 43, 91–107 (2009)
Lian, S., Liu, Z., Zhen, R., Wang, H.: Commutative watermarking and encryption for media data. Optical Engineering 45(8) (2006)
Battisti, F., Cancellaro, M., Boato, G., Carli, M., Neri, A.: Joint watermarking and encryption of color images in the Fibonacci-Haar domain. EURASIP J. Advances in Signal Processing 2009, Article ID 938515 (2009)
Boato, G., Conotter, V., DeNatale, F.G.B., Fontanari, C.: A joint asymmetric watermarking and image encryption scheme. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Proc. SPIE, vol. 6819, p. 68191A (2008)
Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits and Systems for Video Technology 16(3), 354–361 (2006)
Coltuc, D., Bolon, P.: Robust watermarking by histogram specification. In: Proc. 1999 Int. Conf. Image Processing (ICIP 1999), vol. 2, pp. 236–239 (1999)
Chareyron, G., Coltuc, D., Trémeau, A.: Watermarking and authentication of color images based on segmentation of the xyY color space. J. Imaging Science and Technology 50(5), 411–423 (2006)
Roy, S., Chang, E.C.: Watermarking color histograms. In: Proc. 2004 Int. Conf. Image Processing (ICIP 2004), pp. 2191–2194 (2004)
Lin, C.H., Chan, D.Y., Su, H., Hsieh, W.S.: Histogram-oriented watermarking algorithm: colour image watermarking scheme robust against geometric attacks and signal processing. IEE Proc. Vision, Image and Signal Processing 153(4), 483–492 (2006)
Chrysochos, E., Fotopoulos, V., Skodras, A.N., Xenos, M.: Reversible image watermarking based on histogram modification. In: Proc. 11th Panhellenic Conf. Informatics (PCI 2007), pp. 93–104 (2007)
Chen, C., Ni, J., Huang, J.: Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 81–95. Springer, Heidelberg (2009)
Gaubatz, M.: MeTriX MuX visual quality assessment package, http://foulard.ece.cornell.edu/gaubatz/metrix_mux
Slater, J.: Scrambler: TV signal encryption. Electronics Today Int (ETI) 19, 16–20 (1990)
Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. Multimedia 5(1), 118–129 (2003)
Li, S., Li, C., Chen, G., Bourbakis, N.G., Lo, K.T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing: Image Communication 23(3), 212–223 (2008)
Knuth, D.: The Art of Computer Programming, Volume 3: Sorting and Searching, 2nd edn. Addison-Wesley (1998)
Arnold, V.I., Avez, A.: Ergodic Problems of Classical Mechanics. Benjamin (1968)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos 8, 1259–1284 (1998)
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 21(3), 749–761 (2004)
Hadjidemetriou, E., Grossberg, M.D., Nayar, S.K.: Histogram preserving image transformations. Int. J. Computer Vision 45(1), 5–23 (2001)
Zhang, X.: Lossy compression and iterative reconstruction for encrypted image. IEEE Trans. Information Forensics and Security 6(1), 53–58 (2011)
Dyson, F.J., Falk, H.: Period of a discrete cat mapping. The American Mathematical Monthly 99(7), 603–614 (1992)
Wong, K.-W.: Image encryption using chaotic maps. In: Kocarev, L., Galias, Z., Lian, S. (eds.) Intelligent Computing Based on Chaos. SCI, vol. 184, pp. 333–354. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Schmitz, R., Li, S., Grecos, C., Zhang, X. (2012). A New Approach to Commutative Watermarking-Encryption. In: De Decker, B., Chadwick, D.W. (eds) Communications and Multimedia Security. CMS 2012. Lecture Notes in Computer Science, vol 7394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32805-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-32805-3_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32804-6
Online ISBN: 978-3-642-32805-3
eBook Packages: Computer ScienceComputer Science (R0)