Advertisement

Cluster Computing

, Volume 22, Supplement 5, pp 11183–11191 | Cite as

An optimal approach for watermarking using MRC4 encryption scheme

  • C. Kanmani PappaEmail author
  • M. Vijayaraj
  • M. Subbulakshmi
Article

Abstract

As there is rapid revolution in digital multimedia which is in compressed encrypted format, the ability for creating similar and unauthorized data, that can be easily copied, manipulated and distributed has been increased. Hence for copyright management protection, ownership identification, tamper detection and for other security issues watermarking has to be carried out for tamper proofing, quality assessment and copy control for those media content. Thus there is a need for an encryption scheme which could provide security as well as allow us to watermarking these compressed encrypted data. For encryption we propose a stream cipher called Modified Rivest Cipher 4 that overcome several weaknesses of the RC4. The embedding capacity, robustness, perceptual quality and security of the proposed algorithm, using the watermarking schemes: spread spectrum, scalar costa scheme quantization index modulation has been proposed and the comparison based on PSNR, MSE and BER values has been done between various encryption algorithms.

Keywords

MRC4 PSNR MSE BER 

References

  1. 1.
    Battisti, F., Cancellaro, M., Boato, G., Carli, M., Neri, A.: Joint watermarking and encryption of color images in the Fibonacci-Haar domain. EURASIP J. Adv. Signal Process. 1, 938515 (2009)CrossRefGoogle Scholar
  2. 2.
    Bianchi, T., Piva, A., Barni, M.: Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Trans. Inf. Forensics Secur. 5(1), 180–187 (2010)CrossRefGoogle Scholar
  3. 3.
    Cancellaro, M., Battisti, F., Carli, M., Boato, G., De Natale, F., Neri, A.: A joint digital watermarking and encryption method. In: Proceedings of SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, p. 68191C (2008)Google Scholar
  4. 4.
    Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer-seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM workshop on Multimedia and security, pp. 9–18. ACM (2009)Google Scholar
  5. 5.
    Eggers, J., Bauml, R., Tzschoppe, R., Girod, B.: “Scalar costa scheme for information embedding”. IEEE Trans. Signal Process. 51(4), 1003–1019 (2003)Google Scholar
  6. 6.
    ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31(4), 469–472 (1985)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Ganic, E., Eskicioglu, A.M..: Reversible watermarking approach for JPEG and MPEG stream. In: Proceedings of the 7th ACM International Multimedia Conference (ACMMM), Florida, USA, vol. 2, pp. 49–51 (2009)Google Scholar
  8. 8.
    Ganic, E., Eskicioglu, A.M.: Robust DWT-SVD domain image watermarking: embedding data in all frequencies. IEEE Signal Process. Lett. 17(6), 567–570 (2010)CrossRefGoogle Scholar
  9. 9.
    Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci 28(2), 270–299 (1985)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Hammood, M.M., Yoshigoe, K., Sagheer, A.M.: Hammood MM, Yoshigoe K, Sagheer AM. RC4-2S: RC4 stream cipher with two state tables. In: Information Technology Convergence, pp. 13–20. Springer, Dordrecht (2004)Google Scholar
  11. 11.
    Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283–301 (1998)CrossRefGoogle Scholar
  12. 12.
    Hwang, S.O., Yoon, K.S., Jun, K.P., Lee, K.H.: Modeling and implementation of digital rights. J. Syst. Softw. 73(3), 533–549 (2004)CrossRefGoogle Scholar
  13. 13.
    Jindal, P., Singh, B.: Performance analysis of modified RC4 encryption algorithm. In: Recent Advances and Innovations in Engineering (ICRAIE), pp. 1–5. IEEE (2014)Google Scholar
  14. 14.
    Kanmani Pappa, C., Vijayaraj, M.: A novel approach for watermarking in JPEG2000 images using RC4-2S encryption. Adv. Nat. Appl. Sci. 10(4), 184–190 (2016)Google Scholar
  15. 15.
    Lian, Z., Liu, R., Zhen, R., Wang, H.: Commutative watermarking and encryption for media data. Opt. Eng. 45(8), 080510 (2006)CrossRefGoogle Scholar
  16. 16.
    Li. Z., Zhu, X., Lian, Y., and Sun, Q.: Constructing secure contentdependent watermarking scheme using homomorphic encryption. In: Proceedings of the International Conference on Multimedia and Expo, pp. 627–630. IEEE (2007)Google Scholar
  17. 17.
    Mohanty, S.P., Ramakrishnan, K.R., Kanakanhalli, M.S.: A dual watermarking technique for images. In: Proceedings of the 7th ACM International Multimedia Conference (ACMMM), Florida, USA, vol. 2, pp. 49–51 (1999)Google Scholar
  18. 18.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. Eurocrypt 99, 223–238 (1999)MathSciNetzbMATHGoogle Scholar
  19. 19.
    Prins, J., Erkin, Z., Lagendijk, R.: Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP J. Inf. Secur. p. 20 (2007)Google Scholar
  20. 20.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Sachan, A., Emmanuel, S., Das, A., and Kankanhalli, M.S.: Privacy preservingmultiparty multilevel DRM architecture. In: Proceedings of the 6th IEEE Consumer Communications and Networking Conference, Workshop Digital Rights Management, pp. 1–5. IEEE (2009)Google Scholar
  22. 22.
    Schaefer, G., Stich, M.: UCID–An uncompressed colour image database. Multimed. Syst. 15(4), 243–270 (2009)CrossRefGoogle Scholar
  23. 23.
    Shibil Jeyanthi Prasad, LS., Kanmani Pappa, C., Subbulakshmi, M., Vijayaraj, M.: An efficient novel approach for compressed and encrypted domain watermarking. In: JPEG2000 Image International Journal of Recent Development in Engineering and Technology, vol. 2, No. 3, February (2014 )Google Scholar
  24. 24.
    Subramanyam, A.V., Emmanuel, S., Kankanhalli, M.S.: Robust watermarking of compressed and encrypted JPEG2000 images. EEE Trans. Multimed. 14(3), 703–716 (2012)CrossRefGoogle Scholar
  25. 25.
    Subramanyam, A.V., Emmanuel, S., Kankanhalli, M.: Compressed encrypted domain JPEG2000 image watermarking. In: 2010 IEEE International Conference on Multimedia and Expo (ICME), pp. 1315–1320. IEEE (2010)Google Scholar
  26. 26.
    Sun, Q., Chang, S.F., Kurato, M., Suto M.: A quantitive semi-fragile JPEG2000 image authentication system. In: Proceedings. 2002 International Conference on 2002, Vol. 2, pp. 921–924. IEEE (2002)Google Scholar
  27. 27.
    Wu, H., Ma, D.: Efficient and secure encryption schemes for JPEG2000. IEEE International Conference on Acoustics, Speech, and Signal Processing 5, 869–872 (2004)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2017

Authors and Affiliations

  • C. Kanmani Pappa
    • 1
    Email author
  • M. Vijayaraj
    • 2
  • M. Subbulakshmi
    • 3
  1. 1.Department of ECEPSN college of Engineering and TechnologyTirunelveliIndia
  2. 2.Department of ECEGovernment College of EngineeringTirunelveliIndia
  3. 3.Department of ECENational College of EngineeringTirunelveliIndia

Personalised recommendations