Skip to main content

Robust Watermarking of Compressed JPEG Images in Encrypted Domain

  • Conference paper
Book cover Transactions on Data Hiding and Multimedia Security VI

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 6730))

  • 811 Accesses

Abstract

Digital media is often handled in a compressed and encrypted form in Digital Asset Management Systems (DAMS). Therefore, watermarking of these compressed encrypted media items in the compressed-encrypted domain itself is required for copyright violation detection or other purposes. Compression process might compactly pack the raw data of the media and encryption would randomize the compressed data. Thus, embedding a watermark in such a compressed randomized data can cause a dramatic degradation of the media quality. Towards this, the encryption of the compressed media should be such that, it is both secure and will allow watermarking in a predictable manner in the compressed encrypted domain. Further, the encryption mechanism should be such that the bit rate overhead is considerably low as compared to the original compressed VLC codestream. In this paper, we propose a robust watermarking algorithm to watermark JPEG partially compressed and encrypted images, encrypted using a stream cipher. While the proposed technique embeds watermark in the partially compressed-encrypted domain, the extraction of watermark can be done in the encrypted, decrypted or decompressed domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akgün, M., Kavak, P., Demirci, H.: New Results on the Key Scheduling Algorithm of RC4. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 40–52. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. Battisti, F., Cancellaro, M., Boato, G., Carli, M., Neri, A.: Joint Watermarking and Encryption of Color Images in the Fibonacci-Haar Domain. EURASIP Journal on Advances in Signal Processing 2009 (2009)

    Google Scholar 

  3. Bianchi, T., Piva, A., Barni, M.: Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Transactions on Information Forensics and Security 5(1), 180–187 (2010)

    Article  Google Scholar 

  4. Cancellaro, M., Battisti, F., Carli, M., Boato, G., Natale De, F., Neri, A.: A joint digital watermarking and encryption method. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Proc of the SPIE, vol. 6819, pp. 68 191C–68 191C (2008)

    Google Scholar 

  5. Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 109–117 (2005)

    Google Scholar 

  6. Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer-seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 9–18. ACM, New York (2009)

    Chapter  Google Scholar 

  7. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  8. Fluhrer, S.R., McGrew, D.A.: Statistical analysis of the alleged RC4 keystream generator. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 66–71. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  10. Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences 28(2), 270–299 (1984)

    Article  MathSciNet  MATH  Google Scholar 

  11. Hartung, F., Su, J., Girod, B.: Spread spectrum watermarking: Malicious attacks and counterattacks. In: Security and Watermarking of Multimedia Contents, pp. 147–158 (1999)

    Google Scholar 

  12. Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66(3), 283–301 (1998)

    Article  MATH  Google Scholar 

  13. Hwang, S., Yoon, K., Jun, K., Lee, K.: Modeling and implementation of digital rights. The Journal of Systems and Software 73(3), 533–549 (2004)

    Article  Google Scholar 

  14. Klein, A.: Attacks on the RC4 stream cipher. Designs, Codes and Cryptography 48(3), 269–286 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  15. Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE 87(7), 1167–1180 (1999)

    Article  Google Scholar 

  16. Lam, E.Y., Goodman, J.W.: A mathematical analysis of the DCT coefficient distributions for images. IEEE Transactions on Image Processing 9(10), 1661–1666 (2002)

    Article  MATH  Google Scholar 

  17. Li, Z., Zhu, X., Lian, Y., Sun, Q.: Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption. In: IEEE International Conference on Multimedia and Expo., pp. 627–630 (2007)

    Google Scholar 

  18. Lian, S., Liu, Z., Zhen, R., Wang, H.: Commutative watermarking and encryption for media data. Optical Engineering 45, 1–3 (2006)

    Article  Google Scholar 

  19. Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 152–164. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  20. Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Transactions on Image Processing 15(7), 2061–2075 (2006)

    Article  Google Scholar 

  21. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  22. Paul, G., Rathi, S., Maitra, S.: On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key. Designs, Codes and Cryptography 49(1), 123–134 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  23. Prins, J., Erkin, Z., Lagendijk, R.: Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP Journal on Information Security 2007 (2007)

    Google Scholar 

  24. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  25. Sachan, A., Emmanuel, S., Das, A., Kankanhalli, M.S.: Privacy preserving multiparty multilevel drm architecture. In: 6th IEEE Consumer Communications and Networking Conference, Workshop on Digital Rights Management, pp. 1–5 (2009)

    Google Scholar 

  26. Schneier, B.: Applied Cryptography. John Wiley and Sons, New York (1996)

    MATH  Google Scholar 

  27. Shannon, C.: Communication theory of secrecy systems. MD Computing 15(1), 57–64 (1998)

    MathSciNet  Google Scholar 

  28. Thomas, T., Emmanuel, S., Subramanyam, A., Kankanhalli, M.: Joint watermarking scheme for multiparty multilevel DRM architecture. IEEE Transactions on Information Forensics and Security 4(4), 758–767 (2009)

    Article  Google Scholar 

  29. Trappe, W., Wu, M., Wang, Z., Liu, K.: Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing 51(4), 1069–1087 (2003)

    Article  MathSciNet  Google Scholar 

  30. Zhao, B., Kou, W., Li, H., Dang, L., Zhang, J.: Effective Watermarking Scheme in the Encrypted Domain for Buyer-Seller Watermarking Protocol. Information Sciences 180, 4672–4684 (2010)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

A.V., S., Emmanuel, S. (2011). Robust Watermarking of Compressed JPEG Images in Encrypted Domain. In: Shi, Y.Q., et al. Transactions on Data Hiding and Multimedia Security VI. Lecture Notes in Computer Science, vol 6730. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24556-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24556-5_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24555-8

  • Online ISBN: 978-3-642-24556-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics