Skip to main content
Log in

An optimal approach for watermarking using MRC4 encryption scheme

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

As there is rapid revolution in digital multimedia which is in compressed encrypted format, the ability for creating similar and unauthorized data, that can be easily copied, manipulated and distributed has been increased. Hence for copyright management protection, ownership identification, tamper detection and for other security issues watermarking has to be carried out for tamper proofing, quality assessment and copy control for those media content. Thus there is a need for an encryption scheme which could provide security as well as allow us to watermarking these compressed encrypted data. For encryption we propose a stream cipher called Modified Rivest Cipher 4 that overcome several weaknesses of the RC4. The embedding capacity, robustness, perceptual quality and security of the proposed algorithm, using the watermarking schemes: spread spectrum, scalar costa scheme quantization index modulation has been proposed and the comparison based on PSNR, MSE and BER values has been done between various encryption algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Battisti, F., Cancellaro, M., Boato, G., Carli, M., Neri, A.: Joint watermarking and encryption of color images in the Fibonacci-Haar domain. EURASIP J. Adv. Signal Process. 1, 938515 (2009)

    Article  Google Scholar 

  2. Bianchi, T., Piva, A., Barni, M.: Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Trans. Inf. Forensics Secur. 5(1), 180–187 (2010)

    Article  Google Scholar 

  3. Cancellaro, M., Battisti, F., Carli, M., Boato, G., De Natale, F., Neri, A.: A joint digital watermarking and encryption method. In: Proceedings of SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, p. 68191C (2008)

  4. Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer-seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM workshop on Multimedia and security, pp. 9–18. ACM (2009)

  5. Eggers, J., Bauml, R., Tzschoppe, R., Girod, B.: “Scalar costa scheme for information embedding”. IEEE Trans. Signal Process. 51(4), 1003–1019 (2003)

  6. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31(4), 469–472 (1985)

    Article  MathSciNet  Google Scholar 

  7. Ganic, E., Eskicioglu, A.M..: Reversible watermarking approach for JPEG and MPEG stream. In: Proceedings of the 7th ACM International Multimedia Conference (ACMMM), Florida, USA, vol. 2, pp. 49–51 (2009)

  8. Ganic, E., Eskicioglu, A.M.: Robust DWT-SVD domain image watermarking: embedding data in all frequencies. IEEE Signal Process. Lett. 17(6), 567–570 (2010)

    Article  Google Scholar 

  9. Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci 28(2), 270–299 (1985)

    Article  MathSciNet  Google Scholar 

  10. Hammood, M.M., Yoshigoe, K., Sagheer, A.M.: Hammood MM, Yoshigoe K, Sagheer AM. RC4-2S: RC4 stream cipher with two state tables. In: Information Technology Convergence, pp. 13–20. Springer, Dordrecht (2004)

  11. Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283–301 (1998)

    Article  Google Scholar 

  12. Hwang, S.O., Yoon, K.S., Jun, K.P., Lee, K.H.: Modeling and implementation of digital rights. J. Syst. Softw. 73(3), 533–549 (2004)

    Article  Google Scholar 

  13. Jindal, P., Singh, B.: Performance analysis of modified RC4 encryption algorithm. In: Recent Advances and Innovations in Engineering (ICRAIE), pp. 1–5. IEEE (2014)

  14. Kanmani Pappa, C., Vijayaraj, M.: A novel approach for watermarking in JPEG2000 images using RC4-2S encryption. Adv. Nat. Appl. Sci. 10(4), 184–190 (2016)

    Google Scholar 

  15. Lian, Z., Liu, R., Zhen, R., Wang, H.: Commutative watermarking and encryption for media data. Opt. Eng. 45(8), 080510 (2006)

    Article  Google Scholar 

  16. Li. Z., Zhu, X., Lian, Y., and Sun, Q.: Constructing secure contentdependent watermarking scheme using homomorphic encryption. In: Proceedings of the International Conference on Multimedia and Expo, pp. 627–630. IEEE (2007)

  17. Mohanty, S.P., Ramakrishnan, K.R., Kanakanhalli, M.S.: A dual watermarking technique for images. In: Proceedings of the 7th ACM International Multimedia Conference (ACMMM), Florida, USA, vol. 2, pp. 49–51 (1999)

  18. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. Eurocrypt 99, 223–238 (1999)

    MathSciNet  MATH  Google Scholar 

  19. Prins, J., Erkin, Z., Lagendijk, R.: Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP J. Inf. Secur. p. 20 (2007)

  20. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  21. Sachan, A., Emmanuel, S., Das, A., and Kankanhalli, M.S.: Privacy preservingmultiparty multilevel DRM architecture. In: Proceedings of the 6th IEEE Consumer Communications and Networking Conference, Workshop Digital Rights Management, pp. 1–5. IEEE (2009)

  22. Schaefer, G., Stich, M.: UCID–An uncompressed colour image database. Multimed. Syst. 15(4), 243–270 (2009)

    Article  Google Scholar 

  23. Shibil Jeyanthi Prasad, LS., Kanmani Pappa, C., Subbulakshmi, M., Vijayaraj, M.: An efficient novel approach for compressed and encrypted domain watermarking. In: JPEG2000 Image International Journal of Recent Development in Engineering and Technology, vol. 2, No. 3, February (2014 )

  24. Subramanyam, A.V., Emmanuel, S., Kankanhalli, M.S.: Robust watermarking of compressed and encrypted JPEG2000 images. EEE Trans. Multimed. 14(3), 703–716 (2012)

    Article  Google Scholar 

  25. Subramanyam, A.V., Emmanuel, S., Kankanhalli, M.: Compressed encrypted domain JPEG2000 image watermarking. In: 2010 IEEE International Conference on Multimedia and Expo (ICME), pp. 1315–1320. IEEE (2010)

  26. Sun, Q., Chang, S.F., Kurato, M., Suto M.: A quantitive semi-fragile JPEG2000 image authentication system. In: Proceedings. 2002 International Conference on 2002, Vol. 2, pp. 921–924. IEEE (2002)

  27. Wu, H., Ma, D.: Efficient and secure encryption schemes for JPEG2000. IEEE International Conference on Acoustics, Speech, and Signal Processing 5, 869–872 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Kanmani Pappa.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pappa, C.K., Vijayaraj, M. & Subbulakshmi, M. An optimal approach for watermarking using MRC4 encryption scheme. Cluster Comput 22 (Suppl 5), 11183–11191 (2019). https://doi.org/10.1007/s10586-017-1349-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1349-7

Keywords

Navigation