Download presentation
Presentation is loading. Please wait.
Published byInge Kurnia Modified over 6 years ago
1
Secure watermarking scheme against watermark attacks in the encrypted domain
Source: Journal of Visual Communication and Image Representation, Vol.30, pp ,2015. Authors: Jianting Guo, Peijia Zheng and Jiwu Huang. Speaker: Chin Hao Chuan Date: 03/09
2
Outline Related Work Proposed Scheme Experimental Results Conclusions
Paillier homomorphic encryption Proposed Scheme Experimental Results Conclusions
3
Related Work-PHE p,q N=pāq Ī³=ššš šā1,šā1 Public key :(N, g) š
ššš : Least common multiple p,q N=pāq Ī³=ššš šā1,šā1 Public key :(N, g) š gcd L š š¾ ššš š 2 ,š =1 šæ š„ = š„ā1 š Private key:(p, q,Ī³) š= šæ( š š¾ ššš š 2 ) šæ( š š¾ ššš š 2 )
4
Proposed Scheme LL LH HL HH DWT
5
Proposed Scheme šµ 1 LL šµ 2 DCT šµ 1 š 1 šµ 2 š 2 428 403 432 429 425 408
412 416 409 438 405 407 415 431 1 2 1 2 1 2 1 2 428 432 403 404 429 433 425 408 438 412 419 416 402 409 414 421 405 413 407 436 415 411 431 430 401 400 420 427 437 426 šµ 1 432 404 433 429 438 419 402 414 421 413 436 428 411 405 LL šµ 2 428 403 432 429 425 408 412 416 409 438 405 407 415 431 1681 4 9 8 -6 -8 7 11 21 -11 12 24 -3 1 -15 -16 DCT šµ 1 š 1 432 404 433 429 438 419 402 414 421 413 436 428 411 405 1683 7 11 1 15 -3 -4 13 16 17 5 -28 14 šµ 2 š 2
6
Proposed Scheme š¾šš¦ 2 :0101 š 2 = š 1 +2 šš š¤ š =1 š 1 ā2 šš š¤ š =0
1681 4 9 8 -6 -8 7 11 21 -11 12 24 -3 1 -15 -16 š 2 = š šš š¤ š =1 š 1 ā2 šš š¤ š =0 š 1 šā² 2 =7+2=9 1683 7 11 1 15 -3 -4 13 16 17 5 -28 14 šā² 2 =ā3ā2=ā5 1683 7 11 1 15 -3 9 13 -4 16 17 -5 -28 14 š 2 1 š¾šš¦ 1 436 399 427 437 433 438 419 406 411 421 413 432 424 416 410 š
7
Proposed Scheme-extraction
428 403 432 429 425 408 412 416 409 438 405 407 415 431 1681 4 9 8 -6 -8 7 11 21 -11 12 24 -3 1 -15 -16 DCT šµā² 1 šā² 1 436 399 427 437 433 438 419 406 411 421 413 432 424 416 410 1683 7 11 1 15 -3 9 13 -4 16 17 -5 -28 14 šµā² 2 šā² 2 šā² 2 ā š ā² 1 >0 ā š¤ š =1 šā² 2 ā š ā² 1 <0 ā š¤ š =0 1 š¾šš¦ 2 :0101 9ā7=2>0 ā5ā ā3 =ā2<0 š
8
Experimental Results (a) noise attack; (b) cropping attack;
9
Experimental Results (c) BDCTlm; (d) DCTlm; (e) DWTll; (f) JPEG-90;
[11] T. Bianchi, A. Piva, M. Barni, Encrypted domain DCT based on homomorphic cryptosystems, EURASIP J. Inform. Secur. (2009).
10
Experimental Results
11
Conclusions By combining the encrypted domain DWT and DCT, the performance of the watermarking scheme has been improved. The visual quality and the robustness of the scheme are satisfactory.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.