Preview-supported Copyright Image Sharing

被引:0
|
作者
Xiao, Xiangli [1 ]
Ye, Xi [1 ]
Zhang, Yushu [1 ]
Wen, Wenying [2 ]
Zhang, Xinpeng [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Jiangxi Univ Finance & Econ, Sch Informat Management, Nanchang 330032, Peoples R China
[3] Fudan Univ, Sch Comp Sci, Shanghai 201203, Peoples R China
关键词
Digital watermarking; Image encryption; Data hiding; Error-correcting codes;
D O I
10.11999/JEIT220602
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In view of the fact that digital watermarking technology does not consider the preview needs of users in copyright image sharing scenarios, as well as the limitations of software control method and additional information method, a copyright image sharing scheme that supports previewing part of the visual content of the original image directly from the encrypted image is proposed. To this end, the idea of thumbnail preserving encryption is introduced into the user-side embedded watermarking scheme, and a blurred version of the original image content is presented on the encrypted image through pixel adjustment. The pixel bits to be adjusted are embedded into the hidden area by means of information hiding in advance to ensure the correctness of decryption. Moreover, the user watermark is embedded into the image at the same time of decryption, which is used to track the unauthorized redistribution behavior. In this way, not only the preview needs of the user during the sharing process is met, but also the copyright of the image is protected. The results of theoretical analysis and experimental tests demonstrate the security, feasibility, efficiency, and robustness of the proposed scheme.
引用
收藏
页码:800 / 809
页数:10
相关论文
共 20 条
  • [1] TTP-Free Asymmetric Fingerprinting Based on Client Side Embedding
    Bianchi, Tiziano
    Piva, Alessandro
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) : 1557 - 1568
  • [2] Lookup-table-based secure client-side embedding for spread-spectrum watermarks
    Celik, Mehmet Utku
    Lemma, Aweke N.
    Katzenbeisser, Stefan
    van der Veen, Michiel
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) : 475 - 487
  • [3] Chen B, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 1, P13, DOI 10.1109/MMCS.1999.779113
  • [4] GIANG N D, 2021, J RES DEV INFORM COM, V2021, P28
  • [5] [侯兴旺 Hou Xingwang], 2022, [计算机工程与科学, Computer Engineering and Science], V44, P60
  • [6] New additive watermark detectors based on a hierarchical spatially adaptive image model
    Mairgiotis, Antonis K.
    Galatsanos, Nikolaos P.
    Yang, Yongyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) : 29 - 37
  • [7] Approximate Thumbnail Preserving Encryption
    Marohn, Byron
    Wright, Charles, V
    Feng, Wu-chi
    Rosulek, Mike
    Bobba, Rakesh B.
    [J]. PROCEEDINGS OF THE 2017 WORKSHOP ON MULTIMEDIA PRIVACY AND SECURITY (MPS'17), 2017, : 33 - 43
  • [8] PATEL H A, 2021, P 2 INT C SMART EN C, P699, DOI [10.1007/978-981-15-6707-0_68.COXIJ, DOI 10.1007/978-981-15-6707-0_68.COXIJ]
  • [9] Secure Client-Side ST-DM Watermark Embedding
    Piva, Alessandro
    Bianchi, Tiziano
    De Rosa, Alessia
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) : 13 - 26
  • [10] Rhayma H, 2021, MULTIMED TOOLS APPL, V80, P26813, DOI 10.1007/s11042-021-10886-0