The identical operands commutative encryption and watermarking based on homomorphism

被引:0
|
作者
Li Jiang
机构
[1] Zhengzhou University,School of Information Engineering
来源
关键词
Multimedia information security; Homomorphism; Commutative encryption and watermarking;
D O I
暂无
中图分类号
学科分类号
摘要
Aiming at the requirement of comprehensive security protection for multimedia information, this paper proposes a new algorithm to realize the combination of encryption and watermarking based on the homomorphism. Under the proposed algorithm scheme, the plaintext watermark embedding operations are mapped to the ciphertext domain by homomorphism to achieve the plaintext watermark embedding in the ciphertext domain; at the same time, the embedded plaintext watermarks are also mapped to the ciphertext domain by homomorphism to achieve the ciphertext watermarking embedding. According to the experimental results, by the proposed algorithm, the order of watermark embedding and data encrypting does not affect the production of the same encrypted-watermarked data, meanwhile, whether the encrypted-watermarked data being decrypted or not does not affect the extraction of embedded watermark. For the operands of encryption and watermarking being the same data, the proposed algorithm has higher security compared with the existing mainstream independent operands based communicative encryption and watermarking.
引用
收藏
页码:30575 / 30594
页数:19
相关论文
共 50 条
  • [41] Study of MA protection based on Homomorphism Encryption and Time Checking Technology
    Wu, Jiehong
    Zhang, Po
    Wang, Bin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (05): : 51 - 56
  • [42] Research of mobile agent active protection based on homomorphism encryption technology
    Wu, Jie-Hong
    Zhang, Lei
    Zhang, Po
    Shi, Xiang-Bin
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2013, 43 (SUPPL.1): : 221 - 224
  • [43] A novel approach for privacy homomorphism using attribute-based encryption
    Doshi, Nishant
    Jinwala, Devesh C.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4451 - 4467
  • [44] COMMUTATIVE ENCRYPTION METHOD BASED ON HIDDEN LOGARITHM PROBLEM
    Moldovyan, D. N.
    Moldovyan, N. A.
    Moldovyan, A. A.
    BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2020, 13 (02): : 54 - 68
  • [45] A Novel Commutative Blinding Identity Based Encryption Scheme
    Chen, Yu
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 73 - +
  • [46] On identical transformations in commutative semigroups
    Motin, D. M.
    DISCRETE MATHEMATICS AND APPLICATIONS, 2007, 17 (06): : 629 - 640
  • [47] A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm
    ZHANG Yong
    ChineseJournalofElectronics, 2017, 26 (05) : 1022 - 1031
  • [49] A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm
    Zhang Yong
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (05) : 1022 - 1031
  • [50] Digital Watermarking Based on Chaotic Encryption and Wavelet Transformation
    Wang Yuan-mei
    Li Tao
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 3054 - 3058