Source: Journal of Visual Communication and Image Representation, Vol

Slides:



Advertisements
Similar presentations
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Advertisements

Fifth International Conference on Information
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
WATERMARKING Adviser :葉家宏 老師 Presenter :邱怡雯 Date : 2011/03/28.
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Digital Image Watermarking using Hybrid DWT -FFT Technique with Different Attacks Presented By: Mahendra Kumar Faculty at UCE, RTU, Kota (Raj.) India Director,
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Watermarking Scheme Capable of Resisting Sensitivity Attack
DEPARTMENT OF ECE, BEC, BAGALKOT
DCT watermarking Speaker: Paul 1.
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
JPEG Compressed Image Retrieval via Statistical Features
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
Authors: Wei-Chi KU, Hao-Chuan TSAI, Maw-Jinn TSAUR
Image camouflage by reversible image transformation
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
Mean value based reversible data hiding in encrypted images
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Separable and error-free reversible data hiding in encrypted images
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Parag Agarwal Digital Watermarking Parag Agarwal
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Controllable and Trustworthy Blockchain-based Cloud Data Management
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Source : Journal of Visual Communication and Image Representation, vol
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
A new chaotic algorithm for image encryption
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
Mean quantization based image watermarking
A Semi-blind Watermarking Based on Discrete Wavelet Transform
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
An Algorithm for Removable Visible Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
An imperceptible spatial domain color image watermarking scheme
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Hidden Digital Watermarks in Images
Sourse: Information Sciences, Vol. 494, pp , August 2019
An Efficient Spatial Prediction-Based Image Compression Scheme
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Secure watermarking scheme against watermark attacks in the encrypted domain Source: Journal of Visual Communication and Image Representation, Vol.30, pp.125-135,2015. Authors: Jianting Guo, Peijia Zheng and Jiwu Huang. Speaker: Chin Hao Chuan Date: 03/09

Outline Related Work Proposed Scheme Experimental Results Conclusions Paillier homomorphic encryption Proposed Scheme Experimental Results Conclusions

Related Work-PHE p,q N=p∗q γ=𝑙𝑐𝑚 𝑝−1,𝑞−1 Public key :(N, g) 𝑔 𝑙𝑐𝑚 : Least common multiple p,q N=p∗q γ=𝑙𝑐𝑚 𝑝−1,𝑞−1 Public key :(N, g) 𝑔 gcd L 𝑔 𝛾 𝑚𝑜𝑑 𝑁 2 ,𝑁 =1 𝐿 𝑥 = 𝑥−1 𝑁 Private key:(p, q,γ) 𝑚= 𝐿( 𝑐 𝛾 𝑚𝑜𝑑 𝑁 2 ) 𝐿( 𝑔 𝛾 𝑚𝑜𝑑 𝑁 2 )

Proposed Scheme LL LH HL HH DWT

Proposed Scheme 𝐵 1 LL 𝐵 2 DCT 𝐵 1 𝑇 1 𝐵 2 𝑇 2 428 403 432 429 425 408 412 416 409 438 405 407 415 431 1 2 1 2 1 2 1 2 428 432 403 404 429 433 425 408 438 412 419 416 402 409 414 421 405 413 407 436 415 411 431 430 401 400 420 427 437 426 𝐵 1 432 404 433 429 438 419 402 414 421 413 436 428 411 405 LL 𝐵 2 428 403 432 429 425 408 412 416 409 438 405 407 415 431 1681 4 9 8 -6 -8 7 11 21 -11 12 24 -3 1 -15 -16 DCT 𝐵 1 𝑇 1 432 404 433 429 438 419 402 414 421 413 436 428 411 405 1683 7 11 1 15 -3 -4 13 16 17 5 -28 14 𝐵 2 𝑇 2

Proposed Scheme 𝐾𝑒𝑦 2 :0101 𝑋 2 = 𝑋 1 +2 𝑖𝑓 𝑤 𝑖 =1 𝑋 1 −2 𝑖𝑓 𝑤 𝑖 =0 1681 4 9 8 -6 -8 7 11 21 -11 12 24 -3 1 -15 -16 𝑋 2 = 𝑋 1 +2 𝑖𝑓 𝑤 𝑖 =1 𝑋 1 −2 𝑖𝑓 𝑤 𝑖 =0 𝑇 1 𝑋′ 2 =7+2=9 1683 7 11 1 15 -3 -4 13 16 17 5 -28 14 𝑋′ 2 =−3−2=−5 1683 7 11 1 15 -3 9 13 -4 16 17 -5 -28 14 𝑇 2 1 𝐾𝑒𝑦 1 436 399 427 437 433 438 419 406 411 421 413 432 424 416 410 𝑊

Proposed Scheme-extraction 428 403 432 429 425 408 412 416 409 438 405 407 415 431 1681 4 9 8 -6 -8 7 11 21 -11 12 24 -3 1 -15 -16 DCT 𝐵′ 1 𝑇′ 1 436 399 427 437 433 438 419 406 411 421 413 432 424 416 410 1683 7 11 1 15 -3 9 13 -4 16 17 -5 -28 14 𝐵′ 2 𝑇′ 2 𝑋′ 2 − 𝑋 ′ 1 >0 ⇒ 𝑤 𝑖 =1 𝑋′ 2 − 𝑋 ′ 1 <0 ⇒ 𝑤 𝑖 =0 1 𝐾𝑒𝑦 2 :0101 9−7=2>0 −5− −3 =−2<0 𝑊

Experimental Results (a) noise attack; (b) cropping attack;

Experimental Results (c) BDCTlm; (d) DCTlm; (e) DWTll; (f) JPEG-90; [11] T. Bianchi, A. Piva, M. Barni, Encrypted domain DCT based on homomorphic cryptosystems, EURASIP J. Inform. Secur. (2009).

Experimental Results

Conclusions By combining the encrypted domain DWT and DCT, the performance of the watermarking scheme has been improved. The visual quality and the robustness of the scheme are satisfactory.