Abstract
Digital media is often handled in a compressed and encrypted form in Digital Asset Management Systems (DAMS). Therefore, watermarking of these compressed encrypted media items in the compressed-encrypted domain itself is required for copyright violation detection or other purposes. Compression process might compactly pack the raw data of the media and encryption would randomize the compressed data. Thus, embedding a watermark in such a compressed randomized data can cause a dramatic degradation of the media quality. Towards this, the encryption of the compressed media should be such that, it is both secure and will allow watermarking in a predictable manner in the compressed encrypted domain. Further, the encryption mechanism should be such that the bit rate overhead is considerably low as compared to the original compressed VLC codestream. In this paper, we propose a robust watermarking algorithm to watermark JPEG partially compressed and encrypted images, encrypted using a stream cipher. While the proposed technique embeds watermark in the partially compressed-encrypted domain, the extraction of watermark can be done in the encrypted, decrypted or decompressed domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akgün, M., Kavak, P., Demirci, H.: New Results on the Key Scheduling Algorithm of RC4. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 40–52. Springer, Heidelberg (2008)
Battisti, F., Cancellaro, M., Boato, G., Carli, M., Neri, A.: Joint Watermarking and Encryption of Color Images in the Fibonacci-Haar Domain. EURASIP Journal on Advances in Signal Processing 2009 (2009)
Bianchi, T., Piva, A., Barni, M.: Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Transactions on Information Forensics and Security 5(1), 180–187 (2010)
Cancellaro, M., Battisti, F., Carli, M., Boato, G., Natale De, F., Neri, A.: A joint digital watermarking and encryption method. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Proc of the SPIE, vol. 6819, pp. 68 191C–68 191C (2008)
Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 109–117 (2005)
Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer-seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 9–18. ACM, New York (2009)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)
Fluhrer, S.R., McGrew, D.A.: Statistical analysis of the alleged RC4 keystream generator. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 66–71. Springer, Heidelberg (2001)
Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)
Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences 28(2), 270–299 (1984)
Hartung, F., Su, J., Girod, B.: Spread spectrum watermarking: Malicious attacks and counterattacks. In: Security and Watermarking of Multimedia Contents, pp. 147–158 (1999)
Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66(3), 283–301 (1998)
Hwang, S., Yoon, K., Jun, K., Lee, K.: Modeling and implementation of digital rights. The Journal of Systems and Software 73(3), 533–549 (2004)
Klein, A.: Attacks on the RC4 stream cipher. Designs, Codes and Cryptography 48(3), 269–286 (2008)
Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE 87(7), 1167–1180 (1999)
Lam, E.Y., Goodman, J.W.: A mathematical analysis of the DCT coefficient distributions for images. IEEE Transactions on Image Processing 9(10), 1661–1666 (2002)
Li, Z., Zhu, X., Lian, Y., Sun, Q.: Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption. In: IEEE International Conference on Multimedia and Expo., pp. 627–630 (2007)
Lian, S., Liu, Z., Zhen, R., Wang, H.: Commutative watermarking and encryption for media data. Optical Engineering 45, 1–3 (2006)
Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 152–164. Springer, Heidelberg (2002)
Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Transactions on Image Processing 15(7), 2061–2075 (2006)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Paul, G., Rathi, S., Maitra, S.: On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key. Designs, Codes and Cryptography 49(1), 123–134 (2008)
Prins, J., Erkin, Z., Lagendijk, R.: Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP Journal on Information Security 2007 (2007)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Sachan, A., Emmanuel, S., Das, A., Kankanhalli, M.S.: Privacy preserving multiparty multilevel drm architecture. In: 6th IEEE Consumer Communications and Networking Conference, Workshop on Digital Rights Management, pp. 1–5 (2009)
Schneier, B.: Applied Cryptography. John Wiley and Sons, New York (1996)
Shannon, C.: Communication theory of secrecy systems. MD Computing 15(1), 57–64 (1998)
Thomas, T., Emmanuel, S., Subramanyam, A., Kankanhalli, M.: Joint watermarking scheme for multiparty multilevel DRM architecture. IEEE Transactions on Information Forensics and Security 4(4), 758–767 (2009)
Trappe, W., Wu, M., Wang, Z., Liu, K.: Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing 51(4), 1069–1087 (2003)
Zhao, B., Kou, W., Li, H., Dang, L., Zhang, J.: Effective Watermarking Scheme in the Encrypted Domain for Buyer-Seller Watermarking Protocol. Information Sciences 180, 4672–4684 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
A.V., S., Emmanuel, S. (2011). Robust Watermarking of Compressed JPEG Images in Encrypted Domain. In: Shi, Y.Q., et al. Transactions on Data Hiding and Multimedia Security VI. Lecture Notes in Computer Science, vol 6730. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24556-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-24556-5_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24555-8
Online ISBN: 978-3-642-24556-5
eBook Packages: Computer ScienceComputer Science (R0)