The identical operands commutative encryption and watermarking based on homomorphism

被引:0
|
作者
Li Jiang
机构
[1] Zhengzhou University,School of Information Engineering
来源
关键词
Multimedia information security; Homomorphism; Commutative encryption and watermarking;
D O I
暂无
中图分类号
学科分类号
摘要
Aiming at the requirement of comprehensive security protection for multimedia information, this paper proposes a new algorithm to realize the combination of encryption and watermarking based on the homomorphism. Under the proposed algorithm scheme, the plaintext watermark embedding operations are mapped to the ciphertext domain by homomorphism to achieve the plaintext watermark embedding in the ciphertext domain; at the same time, the embedded plaintext watermarks are also mapped to the ciphertext domain by homomorphism to achieve the ciphertext watermarking embedding. According to the experimental results, by the proposed algorithm, the order of watermark embedding and data encrypting does not affect the production of the same encrypted-watermarked data, meanwhile, whether the encrypted-watermarked data being decrypted or not does not affect the extraction of embedded watermark. For the operands of encryption and watermarking being the same data, the proposed algorithm has higher security compared with the existing mainstream independent operands based communicative encryption and watermarking.
引用
收藏
页码:30575 / 30594
页数:19
相关论文
共 50 条
  • [31] Seamlessly Secure Communication Based on the Commutative Encryption
    ZHAO Xianfeng WANG Weinong Network and Information Center Shanghai Jiaotong University Shanghai China
    计算机工程, 2002, (S1) : 97 - 100
  • [32] Oblivious Transfer Protocols based on Commutative Encryption
    Hsu, Jen-Chieh
    Tso, Raylin
    Chen, Yu-Chi
    Wu, Mu-En
    2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
  • [33] CONTINUITY OF A HOMOMORPHISM ON COMMUTATIVE SUBALGEBRAS IS NOT SUFFICIENT FOR CONTINUITY
    ANISZCZYK, B
    FRANKIEWICZ, R
    RYLLNARDZEWSKI, C
    STUDIA MATHEMATICA, 1991, 98 (03) : 247 - 248
  • [34] STUDY OF COMMUTATIVE SEMIGROUPS WITH GREATEST GROUP HOMOMORPHISM
    TAMURA, T
    HAMILTON, HB
    TRANSACTIONS OF THE AMERICAN MATHEMATICAL SOCIETY, 1972, 173 (446) : 401 - 419
  • [35] Exact Sequence and Commutative Diagrams of Semimodule Homomorphism
    肖泽昌
    数学季刊, 1997, (02) : 108 - 110
  • [36] COMMUTATIVE SEMIGROUPS WITH GREATEST GROUP-HOMOMORPHISM
    TAMURA, T
    HAMILTON, HB
    PROCEEDINGS OF THE JAPAN ACADEMY, 1971, 47 (08): : 671 - &
  • [37] Music Protection Based on Digital Watermarking and Encryption
    徐常凯
    王耀才
    Journal of China University of Mining & Technology, 2003, (01) : 60 - 65
  • [38] Secure multimedia distribution based on watermarking and encryption
    Li H.
    Liu G.
    Dai Y.
    Wang Z.
    Journal of Convergence Information Technology, 2010, 5 (09) : 279 - 286
  • [39] Image Encryption Based on Digital Watermarking Technology
    Zhang, Shuang
    Qin, Yu-ping
    Wang, Xiao-juan
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3965 - 3969
  • [40] A Secure Structured Multisignature Scheme Based on a Non-commutative Ring Homomorphism
    Yanai, Naoto
    Chida, Eikoh
    Mambo, Masahiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1346 - 1355