A Robust Zero-Watermarking Algorithm for Encrypted Medical Images in the DWT-DFT Encrypted Domain

  • Jiangtao Dong
  • Jingbing LiEmail author
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 60)


In order to protect personal information, numerous works has been done in watermarking field. However, there still leaves some problems to be solved: (1) most of the watermarking methods were processed in the plaintext domains, which leave latent risk of exposing host image information, thus it is needed to encrypt the host image and process the watermarking scheme in the encrypted domain; (2) numerous image encryption methods had been searched, while not all of them can meet the robustness requirements when applied in the encrypted domain; (3) for some special fields of watermarking applications, medical images, for example, image integrity is an important criterion that should be strictly taken into account. Thus, that kind of watermarking methods which applies by modifying the pixel values are not suitable in this situation. In order to achieve information hiding in such kind of images, special techniques which do not change image integrity is needed. (4) By utilizing homomorphic encryption scheme, one can process watermark extraction without decrypting the encrypted watermarked image first, while it cost too much time in image encryption and decryption, the computational speed need to be improved. Based on the points mentioned above, we proposed a robust zero-watermarking scheme in the DWT-DFT encrypted domain, which embeds and extracts watermark without modifying the pixel values. Firstly, we encrypted both original medical image and watermark image. Then, we extract the DWT-DFT low frequency coefficients as encrypted medical images’ feature vector. In watermark embedding and extraction phases, we adopt zero-watermarking technique to ensure integrity of medical images. Taking “db2” wavelet transform for example, we conduct the experiments on the visual quality and robustness of our watermarking scheme. Experimental results demonstrate that our algorithm achieves not only good watermarking robustness, but also ideal computation speed in the homomorphic encrypted domain.


Robustness Zero-watermarking Feature vector Homomorphic cryptosystem DWT-DFT encrypted domain 



This work was supported by National Natural Science Foundation of China (No.61263033), International Science and Technology Cooperation Project of China (NO. KJHZ 2015-04) and the Institutions of Higher Learning Scientific Research Special Project of Hainan province, China (NO. Hnkyzx2014-2).


  1. 1.
    Bianchi, T., Piva, A.: Secure watermarking for multimedia content protection: a review of its benefits and open issues. Sig. Process. 30(2), 87–96 (2013)CrossRefGoogle Scholar
  2. 2.
    Li, S., Chen, G., Cheung, A., Bhargava, B., Lo, K.-T.: On the design of perceptual MPEG video encryption algorithms. IEEE Trans. Circ. Syst. Video Technol. 17, 214–223 (2007)CrossRefGoogle Scholar
  3. 3.
    Zhang, G., Liu, Q.: A novel image encryption method based on total shuffling scheme. Opt. Commun. 284, 2775–2780 (2011)CrossRefGoogle Scholar
  4. 4.
    Rial, A., Deng, M., Bianchi, T., Piva, A., Preneel, B.: A provably secure anonymous buye-seller watermarking protocol. IEEE Trans. Inform. Forensics Sec. 5(4), 920–931 (2010)CrossRefGoogle Scholar
  5. 5.
    Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer-seller watermarking protocol based on composite signal representation. In: Proceedings of 11th ACM Workshop Multimedia and Security, pp.9–18. Princeton, NJ (2009)Google Scholar
  6. 6.
    Abdallah, Hanaa A., Faragallah, Osama S., Elsayed, Hala S., et al.: Robust image watermarking method using homomorphic block-based KLT. Optik 127(4), 2374–2381 (2016)CrossRefGoogle Scholar
  7. 7.
    Li, Z., Zhu, X., Lian, Y., et al.: Constructing secure content-dependent watermarking scheme using homomorphic encryption. IEEE Int. Conf. Multimedia Expo, 627–630 (2007)Google Scholar
  8. 8.
    Zheng, Peijia, Huang, Jiwu: Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain. IEEE Trans. Image Process. 22(6), 2455–2468 (2013)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Bianchi, T., Piva, A., Barni, M.: On the implementation of the discrete Fourier transform in the encrypted domain. IEEE Trans. Inf. Forensics Secur. 4(1), 86–97 (2009)CrossRefGoogle Scholar
  10. 10.
    Zheng, P., Huang, J.: Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking. In: Proceedings of 14th Information Hiding Conference, pp. 240–254 (2012)Google Scholar
  11. 11.
    Kang, X., Huang, J., Shi, Y., Lin, Y.: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circ. Syst. Video Technol. 13 (8), 776–786 (2003)Google Scholar
  12. 12.
    Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169–180 (1978)MathSciNetGoogle Scholar
  13. 13.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology—EUROCRYPT’ 99, pp. 223–238. Springer(1999)Google Scholar
  14. 14.
    Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984)MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Failla, P., Sutcu, Y., Barni, M.: Esketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, ACM, pp.241–246 (2010)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.College of Information Science and TechnologyHainan UniversityHaikouChina

Personalised recommendations