[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3489088.3489130acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesic3inaConference Proceedingsconference-collections
research-article

Preserving Privacy for Blockchain-driven Image Watermarking using Fully Homomorphic Encryption

Published: 13 February 2022 Publication History

Abstract

Blockchain-driven image watermarking enables traceable and transparent watermark embedding for undeniable authenticity or proof of ownership. Nonetheless, blockchain public ledger is not suitable for privacy concern applications such as for personal health records or digital image transactions. This paper investigates the feasibility and impact of using Fully Homomorphic Encryption (FHE) to preserve user privacy during watermark embedding while retaining the watermarking traceability using blockchain smart contracts. We evaluate the FHE feasibility using SVD-based watermarking by breaking down the SVD operations into fully and partial SVD operations. We consider three performance metrics: the noise budget, storage requirement, and computation cost. For quality evaluation, we analyze the effect of fractional encoding on the quality of the watermarked image and the embedded watermark. The results show that only the partial singular value addition (SVA) operation has a feasible performance by having low computation cost and low noise expense. It incurs a negligible degradation of the watermark quality, either on the watermarked image or in the extracted watermark data.

Supplementary Material

Presentation slides (ic3ina2021-42.pdf)

References

[1]
Hanaa A Abdallah, Rania A Ghazy, Hany Kasban, Osama S Faragallah, Abdalhameed A Shaalan, Mohiy M Hadhoud, Moawad I Dessouky, Nawal A El-Fishawy, Saleh A Alshebeili, and Fathi E Abd El-samie. 2014. Homomorphic image watermarking with a singular value decomposition algorithm. Information processing & management 50, 6 (2014), 909–923.
[2]
Ayoub Benaissa, Bilal Retiat, Bogdan Cebere, and Alaa Eddine Belfedhal. 2021. TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption. arxiv:2104.03152 [cs.CR]
[3]
DV Satish Chandra. 2002. Digital image watermarking using singular value decomposition. In The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002., Vol. 3. IEEE, III–III.
[4]
Jianguo Chen, Kenli Li, and S Yu Philip. 2021. Privacy-Preserving Deep Learning Model for Decentralized VANETs Using Fully Homomorphic Encryption and Blockchain. IEEE Transactions on Intelligent Transportation Systems (2021).
[5]
Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song. 2017. Homomorphic encryption for arithmetic of approximate numbers. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 409–437.
[6]
DSRGBRIN. 2021. WatermarkingPrivacy. Retrieved September 15, 2021 from https://github.com/DSRGBRIN/WatermarkingPrivacy
[7]
Ashutosh Dhar Dwivedi. 2019. A Scalable Blockchain Based Digital Rights Management System.IACR Cryptol. ePrint Arch. 2019 (2019), 1217.
[8]
Franco Frattolillo. 2020. A Watermarking Protocol Based on Blockchain. Applied Sciences 10, 21 (2020), 7746.
[9]
University of Southern California. 2021. SIPI Image Database. Retrieved September 15, 2021 from http://sipi.usc.edu/database
[10]
Zhan Qin, Jian Weng, Yong Cui, and Kui Ren. 2018. Privacy-preserving image processing in the cloud. IEEE Cloud Computing 5, 2 (2018), 48–57.
[11]
Didi Rosiyadi, Shi-Jinn Horng, Pingzhi Fan, Xian Wang, Muhammad Khurram Khan, and Yi Pan. 2011. Copyright protection for e-government document images. IEEE MultiMedia 19, 3 (2011), 62–73.
[12]
Teak-Young Seong, Ki-Chang Kwon, Suk-Hwan Lee, Kwang-Seok Moon, and Ki-Ryong Kwon. 2014. DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol. Journal of Korea Multimedia Society 17, 12 (2014), 1402–1411.
[13]
Alexander Sverdlov, Scott Dexter, and Ahmet M Eskicioglu. 2005. Robust DCT-SVD domain image watermarking for copyright protection: embedding data in all frequencies. In 2005 13th European Signal Processing Conference. IEEE, 1–4.
[14]
Sharath Yaji, Kajal Bangera, and B Neelima. 2018. Privacy preserving in blockchain based on partial homomorphic encryption system for AI applications. In 2018 IEEE 25th International Conference on High Performance Computing Workshops (HiPCW). IEEE, 81–85.
[15]
Meng Zhaoxiong, Morizumi Tetsuya, Miyata Sumiko, and Kinoshita Hirotsugu. 2019. Perceptual hashing based on machine learning for blockchain and digital watermarking. In 2019 Third World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4). IEEE, 193–198.
[16]
Lijing Zhou, Licheng Wang, Tianyi Ai, and Yiru Sun. 2018. BeeKeeper 2.0: confidential blockchain-enabled IoT system with fully homomorphic computation. Sensors 18, 11 (2018), 3785.

Cited By

View all
  • (2022)Improving Efficiency on BFV-based Encrypted Watermarking using Hadamard Product Decomposition2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)10.1109/NISS55057.2022.10085020(1-6)Online publication date: 30-Mar-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
IC3INA '21: Proceedings of the 2021 International Conference on Computer, Control, Informatics and Its Applications
October 2021
204 pages
ISBN:9781450385244
DOI:10.1145/3489088
© 2021 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 February 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Blockchain
  2. Fully Homomorphic Encryption
  3. Image Watermarking
  4. Privacy-preserving
  5. SVD

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

IC3INA 2021

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)33
  • Downloads (Last 6 weeks)3
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Improving Efficiency on BFV-based Encrypted Watermarking using Hadamard Product Decomposition2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)10.1109/NISS55057.2022.10085020(1-6)Online publication date: 30-Mar-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media