Stained Visible Watermarking: A Securely Tunable Way of Joint Image Copyright and Privacy Protection

  • Xiaoming YaoEmail author
  • Hao Wang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1129)


Tunability of the visual degradation of the publicized image may impact the security of the protected content when selective encryption and visible watermarking are separately used to protect the image copyright and privacy. Either the consistency inside the visible watermark or the relevance of the public data to the encrypted one can be exploited for the unauthorized recovery without keys. In this paper, we propose a novel framework, referred to as stained visible watermarking, that integrates the perceptual cryptography and visible watermarking into a secure and tunable system to protect both the copyright and the privacy. Key-generated noises as tunable stains work together with the visible watermark to disguise the protected data with the required level of intelligibility and break the consistency of neighboring pixels inside the visible watermark to enhance the robustness of the watermark. The tunability of the visual degradation is fully controlled by the strength parameters of the stains and watermark. Data normalization is introduced for reversibility to avoid potential under/over-flow. Experimental results and security analysis have demonstrated that our proposed scheme can jointly protect the privacy and copyright of images that are posted online, and the publicized image can be securely fine-tuned to adapt to the requirement of the applications.


Copyright protection Visible watermarking Privacy-preserving Security Selective encryption Tunability 



This project is supported by the National Natural Science Foundation of China under Grant 61462023.


  1. 1.
    Dahl, R., Norouzi, M., Shlens, J.: Pixel recursive super-resolution. In: Proceedings of IEEE ICCV 2017, Venice, Italy, pp. 5449–5458 (2018)Google Scholar
  2. 2.
    Dekel, T., Rubinstein, M., Liu, C., Freeman, W.T.: On the effectiveness of visible watermarks. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2017), Honolulu, Hawaii, USA, pp. 6864–6872 (2017)Google Scholar
  3. 3.
    Honda, T., Murakami, Y., et al.: Hierarchical image scrambling method with scramble-level controllability for privacy protection. In: Proceedings of IEEE International Midwest Symposium on Circuits and Systems, OH, USA, pp. 1371–1374 (2013)Google Scholar
  4. 4.
    Huang, C., Wu, J.: Attacking visible watermarking schemes. IEEE Trans. Multimedia 6(1), 16–30 (2004)CrossRefGoogle Scholar
  5. 5.
    Kuo, C., Chen, M.: A new signal encryption technique and its attack study. In: Proceedings of IEEE International Conference on Security Technology, Taipei, Taiwan, pp. 149–153 (1991)Google Scholar
  6. 6.
    Li, G., Ito, Y., et al.: Recoverable privacy protection for video content distribution. EURASIP J. Inf. Secur. 2009, 1–11 (2009)CrossRefGoogle Scholar
  7. 7.
    Lian, S., Sun, J., Wang, Z.: Perceptual cryptography on JPEG2000 compressed images or videos. In: Proceedings of IEEE CIT 2004, Wuhan, China, pp. 78–82 (2004)Google Scholar
  8. 8.
    Massoudi, A., Lefebvre, F., De Vleeschouwer, C., et al.: Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Inf. Secur. 2008 (2008). Article no. 179290Google Scholar
  9. 9.
    Tsai, H., Chang, L.: A high secure reversible visible watermarking scheme. In: Proceedings of IEEE ICME 2007, Beijing, China, pp. 2106–2109 (2007)Google Scholar
  10. 10.
    Wu, C., Kuo, C.: Fast encryption methods for audiovisual data confidentiality. In: Proceedings of SPIE 4209, Multimedia Systems and Applications III, 22 March 2001.
  11. 11.
    The USC-SIPI image databases.

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Hainan UniversityHaikouChina
  2. 2.Nsfocus Information Technology Co., LtdHaikouChina

Personalised recommendations