Abstract
Joint watermarking and encryption is an upcoming security solution that combines leading but complementary techniques to achieve an enhanced security level. Real time applications using joint watermarking and encryption framework has three requirements: data to be efficiently compressed, watermarking technique to sustain compression, and encryption technique to be developed in a way so as not to disturb the compression efficiency. Finding an optimal solution that combines the three techniques while fulfilling these requirements is a challenging problem. This paper thus, proposes a wavelet domain based joint watermarking and encryption framework that employs singular value decomposition based watermark embedding and sign bit encryption prior to compression. The varying significance of different subbands has been considered to encrypt the data without adversely effecting the compression ratio. Experimental analysis using various evaluation parameters and attack scenarios has revealed the ability of the proposed framework to prove content-ownership, even from the encrypted data. Comparative analysis with the existing techniques reflect its ability to provide better security with less computational resources. This makes it a preferable solution for data security at all stages of data archival, transmission or distribution.
Similar content being viewed by others
References
Boato G, Conci N, Conotter V, De Natale FGB, Fontanari C (2008) Multimedia asymmetric watermarking and encryption. Electronics Lett 44(9):601–602
Chang FC, Huang HC, Hang HM (2007) Layered access control schemes on watermarked scalable media. J VLSI Signal Process Syst Signal Image Video Technol 49(3):443–455
Committee on Intellectual Property Rights in the Emerging Information Infrastructure (2000) The digital dilemma: intellectual property in the information age. US National Research Council, National Academic Press, Washington, D.C.
Dewilde P, Deprettere EdF (1988) Singular value decomposition. An introduction. In: Deprettere EdF (ed) SVD and signal process.: algorithms, applications, and architectures. Elsevier Science Publishers, North Holland, pp 3–41
Eskicioglu AM (2003) Protecting intellectual property in digital multimedia networks. IEEE Comput 36(7):39–45
Eskicioglu AM (2003) Multimedia security in group communications: recent progress in key management, authentication, and watermarking. Multimedia Syst 9:239–248
Huang HC, Chen YH (2009) Genetic fingerprinting for copyright protection of multicast media. Soft Comput 13(4):383–391
Kundur D, Hatzinakos D (2004) Towards robust logo watermarking using multiresolution image fusion. IEEE Trans Multimedia 6(1):185–197
Li B, He J, Huang JW, Shi YQ (2011) A survey on image steganography and steganalysis. J Inf Hiding Multimedia Sig Proc 2(2):142–172
Lian S, Liu Z, Zhen R, Wang H (2006) Commutative watermarking and encryption for media data. Optical Engg Lett 45(8):1–3
Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. IEEE Trans Circuits Syst Video Technol 17(6):774–778
Lian S (2009) Quasi-commutative watermarking and encryption for secure media content distribution. Multimed Tools Appl 43(1):91–107
Liu J-L (2006) Effective selective encryption for Jpeg2000 images using private initial table. Pattern Recogn 39:1509–1517
Mao Y, Wu M (2006) A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans Image Process 15(7):2061–2075
Peterson G (1997) Arnold’s cat map. Available from: http:online.redwoods.cc.ca.us/instruct/darnold/maw/catmap3.htm
Pommer A, Uhl A (2003) Selective encryption of wavelet-packet encoded image data: Efficiency and security. Multimedia Syst 9(3):279–287
Said A, Pearlman WA (1996) A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans Circuits Syst Video Technol 6(3):243–250
Schneier B (1995) Applied cryptography second edition: protocols, algorithms, and source code in C. Wiley, New York
Simitopoulos D, Zissis N, Georgiadis P, Emmanouilidis V, Strintzis MG (2003) Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. Multimedia Security 9(3):217–227
Su K, Kundur D, Hatzinakos D (2005) Statistical invisibility in collusion-resistant digital video watermarking. IEEE Trans Multimedia 7(1):43–51
Wu T, Wu S (1997) Selective encryption and watermarking of MPEG video. In: Proc. int. conf. image science, systems and technology. Ontario, Canada
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Taneja, N., Bhatnagar, G., Raman, B. et al. Joint watermarking and encryption for still visual data. Multimed Tools Appl 67, 593–606 (2013). https://doi.org/10.1007/s11042-012-1037-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-012-1037-9