Joint Image Encryption and Screen-Cam Robust Two Watermarking Scheme

被引:15
|
作者
Chen, Weitong [1 ,2 ,3 ]
Ren, Na [1 ,2 ,3 ]
Zhu, Changqing [1 ,2 ,3 ]
Keskinarkaus, Anja [4 ]
Seppanen, Tapio [4 ]
Zhou, Qifei [1 ,2 ,3 ]
机构
[1] Nanjing Normal Univ, Minist Educ, Key Lab Virtual Geog Environm, Nanjing 210023, Peoples R China
[2] State Key Lab Cultivat Base Geog Environm Evolut, Nanjing 210023, Peoples R China
[3] Jiangsu Ctr Collaborat Innovat Geog Informat Reso, Nanjing 210023, Peoples R China
[4] Univ Oulu, Ctr Machine Vis & Signal Anal, Physiol Signal Anal Team, Oulu 90014, Finland
基金
中国国家自然科学基金;
关键词
image encryption; chaotic mapping; screen-cam process; robust watermarking; discrete fourier transform; smartphone;
D O I
10.3390/s21030701
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This paper proposes a joint encryption and screen-cam robust watermarking scheme. This method combines the advantages of smartphone, encryption and watermarking technologies, thereby achieving watermark extraction with a smartphone, partial decryption and tracking leakage from sneak shots. We design a dual watermarking algorithm to achieve watermark detection from both encrypted and decrypted images. First, a watermark is embedded in the discrete Fourier transform (DFT) domain to enable leakage tracking. Then, a second watermark is generated based on QR (Quick response) code encoding and inverse DFT to achieve high watermark capacity and error correction ability, where the secret key for decryption is included in the watermark message. By hiding this message carrying the watermark for the encrypted image in the changes caused by embedding the first watermark, we can improve imperceptibility and will not affect the effectiveness of the proposed scheme. Finally, to enhance the robustness of watermark after encryption, a chaotic mapping-based segment encryption algorithm is proposed. In the process of watermark detection, to cope with perspective correction, a frame locating based algorithm is employed to achieve watermark synchronization from a recaptured picture of the encrypted image. Considering the severe quality degradation, we use a noise component and local statistic feature-based method to extract the message bits. The experimental results show that the proposed scheme is secure, and highly robust, to screen-cam the process for both before and after decryption. Additionally, after decryption, the proposed scheme also has high robustness against common image processing attacks.
引用
收藏
页码:1 / 28
页数:27
相关论文
共 50 条
  • [31] A Robust Image Watermarking Scheme Based on BWT and ICA
    Wang, Tao
    Tang, Jin
    Luo, Bin
    Zhang, Cheng
    PARTIALLY SUPERVISED LEARNING, PSL 2013, 2013, 8193 : 91 - 103
  • [32] A New Robust Watermarking Scheme to Increase Image Security
    Hossein Rahmani
    Reza Mortezaei
    Mohsen Ebrahimi Moghaddam
    EURASIP Journal on Advances in Signal Processing, 2010
  • [33] A Robust Image Watermarking Scheme Based on Image Normalization and Contourlet Transform
    Wu, Shaobao
    Wu, Zhihua
    Huang, Meixuan
    Shen, Dongsheng
    IEEE ACCESS, 2023, 11 : 105810 - 105818
  • [34] Digital Image Watermarking Scheme in Wavelet Domain Using Chaotic Encryption
    Khare, Priyank
    Verma, Alok Kumar
    Srivastava, V. K.
    2014 STUDENTS CONFERENCE ON ENGINEERING AND SYSTEMS (SCES), 2014,
  • [35] IMAGE SECURING BASED CHAOTIC ENCRYPTION COUPLED WITH DCT ROBUST WATERMARKING
    Seddik, Hassen
    Ben Braiek, Ezzdine
    2013 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND SOFTWARE APPLICATIONS (ICEESA), 2013, : 653 - 658
  • [36] An efficient and robust image encryption scheme for medical applications
    Kanso, A.
    Ghebleh, M.
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 24 (1-3) : 98 - 116
  • [37] TBLT-AES: A Robust Image Encryption Scheme
    De, Supriyo
    Bhaumik, Jaydeb
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (03): : 273 - 288
  • [38] A ROBUST CHAOS-BASED IMAGE ENCRYPTION SCHEME
    Li, Weihai
    Yu, Nenghai
    ICME: 2009 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-3, 2009, : 1034 - 1037
  • [39] A Robust Image Encryption Scheme Over Wireless Channels
    Liu, Dan-hua
    Shi, Guang-ming
    Gao, Da-hua
    Gao, Min
    2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 731 - 736
  • [40] Joint Watermarking\Encryption Image for Safe Transmission: Application on Medical Imaging
    Ajili, Sondes
    Hajjaji, Mohamed Ali
    Bouallegue, Belgacem
    Mtibaa, Abdellatif
    2014 GLOBAL SUMMIT ON COMPUTER & INFORMATION TECHNOLOGY (GSCIT), 2014,