Abstract
As there is rapid revolution in digital multimedia which is in compressed encrypted format, the ability for creating similar and unauthorized data, that can be easily copied, manipulated and distributed has been increased. Hence for copyright management protection, ownership identification, tamper detection and for other security issues watermarking has to be carried out for tamper proofing, quality assessment and copy control for those media content. Thus there is a need for an encryption scheme which could provide security as well as allow us to watermarking these compressed encrypted data. For encryption we propose a stream cipher called Modified Rivest Cipher 4 that overcome several weaknesses of the RC4. The embedding capacity, robustness, perceptual quality and security of the proposed algorithm, using the watermarking schemes: spread spectrum, scalar costa scheme quantization index modulation has been proposed and the comparison based on PSNR, MSE and BER values has been done between various encryption algorithms.
Similar content being viewed by others
References
Battisti, F., Cancellaro, M., Boato, G., Carli, M., Neri, A.: Joint watermarking and encryption of color images in the Fibonacci-Haar domain. EURASIP J. Adv. Signal Process. 1, 938515 (2009)
Bianchi, T., Piva, A., Barni, M.: Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Trans. Inf. Forensics Secur. 5(1), 180–187 (2010)
Cancellaro, M., Battisti, F., Carli, M., Boato, G., De Natale, F., Neri, A.: A joint digital watermarking and encryption method. In: Proceedings of SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, p. 68191C (2008)
Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer-seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM workshop on Multimedia and security, pp. 9–18. ACM (2009)
Eggers, J., Bauml, R., Tzschoppe, R., Girod, B.: “Scalar costa scheme for information embedding”. IEEE Trans. Signal Process. 51(4), 1003–1019 (2003)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31(4), 469–472 (1985)
Ganic, E., Eskicioglu, A.M..: Reversible watermarking approach for JPEG and MPEG stream. In: Proceedings of the 7th ACM International Multimedia Conference (ACMMM), Florida, USA, vol. 2, pp. 49–51 (2009)
Ganic, E., Eskicioglu, A.M.: Robust DWT-SVD domain image watermarking: embedding data in all frequencies. IEEE Signal Process. Lett. 17(6), 567–570 (2010)
Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci 28(2), 270–299 (1985)
Hammood, M.M., Yoshigoe, K., Sagheer, A.M.: Hammood MM, Yoshigoe K, Sagheer AM. RC4-2S: RC4 stream cipher with two state tables. In: Information Technology Convergence, pp. 13–20. Springer, Dordrecht (2004)
Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283–301 (1998)
Hwang, S.O., Yoon, K.S., Jun, K.P., Lee, K.H.: Modeling and implementation of digital rights. J. Syst. Softw. 73(3), 533–549 (2004)
Jindal, P., Singh, B.: Performance analysis of modified RC4 encryption algorithm. In: Recent Advances and Innovations in Engineering (ICRAIE), pp. 1–5. IEEE (2014)
Kanmani Pappa, C., Vijayaraj, M.: A novel approach for watermarking in JPEG2000 images using RC4-2S encryption. Adv. Nat. Appl. Sci. 10(4), 184–190 (2016)
Lian, Z., Liu, R., Zhen, R., Wang, H.: Commutative watermarking and encryption for media data. Opt. Eng. 45(8), 080510 (2006)
Li. Z., Zhu, X., Lian, Y., and Sun, Q.: Constructing secure contentdependent watermarking scheme using homomorphic encryption. In: Proceedings of the International Conference on Multimedia and Expo, pp. 627–630. IEEE (2007)
Mohanty, S.P., Ramakrishnan, K.R., Kanakanhalli, M.S.: A dual watermarking technique for images. In: Proceedings of the 7th ACM International Multimedia Conference (ACMMM), Florida, USA, vol. 2, pp. 49–51 (1999)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. Eurocrypt 99, 223–238 (1999)
Prins, J., Erkin, Z., Lagendijk, R.: Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP J. Inf. Secur. p. 20 (2007)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Sachan, A., Emmanuel, S., Das, A., and Kankanhalli, M.S.: Privacy preservingmultiparty multilevel DRM architecture. In: Proceedings of the 6th IEEE Consumer Communications and Networking Conference, Workshop Digital Rights Management, pp. 1–5. IEEE (2009)
Schaefer, G., Stich, M.: UCID–An uncompressed colour image database. Multimed. Syst. 15(4), 243–270 (2009)
Shibil Jeyanthi Prasad, LS., Kanmani Pappa, C., Subbulakshmi, M., Vijayaraj, M.: An efficient novel approach for compressed and encrypted domain watermarking. In: JPEG2000 Image International Journal of Recent Development in Engineering and Technology, vol. 2, No. 3, February (2014 )
Subramanyam, A.V., Emmanuel, S., Kankanhalli, M.S.: Robust watermarking of compressed and encrypted JPEG2000 images. EEE Trans. Multimed. 14(3), 703–716 (2012)
Subramanyam, A.V., Emmanuel, S., Kankanhalli, M.: Compressed encrypted domain JPEG2000 image watermarking. In: 2010 IEEE International Conference on Multimedia and Expo (ICME), pp. 1315–1320. IEEE (2010)
Sun, Q., Chang, S.F., Kurato, M., Suto M.: A quantitive semi-fragile JPEG2000 image authentication system. In: Proceedings. 2002 International Conference on 2002, Vol. 2, pp. 921–924. IEEE (2002)
Wu, H., Ma, D.: Efficient and secure encryption schemes for JPEG2000. IEEE International Conference on Acoustics, Speech, and Signal Processing 5, 869–872 (2004)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Pappa, C.K., Vijayaraj, M. & Subbulakshmi, M. An optimal approach for watermarking using MRC4 encryption scheme. Cluster Comput 22 (Suppl 5), 11183–11191 (2019). https://doi.org/10.1007/s10586-017-1349-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1349-7