Joint watermarking and encryption for still visual data

被引:0
|
作者
Nidhi Taneja
Gaurav Bhatnagar
Balasubramanian Raman
Indra Gupta
机构
[1] Indian Institute of Technology Roorkee,Department of Electrical Engineering
[2] University of Windsor,Department of Electrical and Computer Engineering
[3] Indian Institute of Technology Roorkee,Department of Mathematics
来源
关键词
Joint watermarking and encryption; Singular value decomposition; Set partitioning in hierarchical trees;
D O I
暂无
中图分类号
学科分类号
摘要
Joint watermarking and encryption is an upcoming security solution that combines leading but complementary techniques to achieve an enhanced security level. Real time applications using joint watermarking and encryption framework has three requirements: data to be efficiently compressed, watermarking technique to sustain compression, and encryption technique to be developed in a way so as not to disturb the compression efficiency. Finding an optimal solution that combines the three techniques while fulfilling these requirements is a challenging problem. This paper thus, proposes a wavelet domain based joint watermarking and encryption framework that employs singular value decomposition based watermark embedding and sign bit encryption prior to compression. The varying significance of different subbands has been considered to encrypt the data without adversely effecting the compression ratio. Experimental analysis using various evaluation parameters and attack scenarios has revealed the ability of the proposed framework to prove content-ownership, even from the encrypted data. Comparative analysis with the existing techniques reflect its ability to provide better security with less computational resources. This makes it a preferable solution for data security at all stages of data archival, transmission or distribution.
引用
收藏
页码:593 / 606
页数:13
相关论文
共 50 条
  • [41] A Block Encryption Scheme for Secure Still Visual Data based on One-Way Coupled Map Lattice
    Zaghloul, Alaa
    Zhang, Tiejun
    Hou, Handan
    Amin, Mohamed
    Abd El-Latif, Ahmed A.
    Abd El-Wahab, Mohamed S.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 89 - 99
  • [42] Joint Reversible Data Hiding and Image Encryption
    Yang, Bian
    Busch, Christoph
    Niu, Xiamu
    MEDIA FORENSICS AND SECURITY II, 2010, 7541
  • [43] Commutative encryption and watermarking based on SVD for secure GIS vector data
    Na Ren
    Ming Zhao
    Changqing Zhu
    Xiaohui Sun
    Yazhou Zhao
    Earth Science Informatics, 2021, 14 : 2249 - 2263
  • [44] A robust and lossless commutative encryption and watermarking algorithm for vector geographic data
    Guo, Shuitao
    Zhu, Shijie
    Zhu, Changqing
    Ren, Na
    Tang, Wei
    Xu, Dingjie
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [45] A new hybrid watermarking technique using data matrix and encryption keys
    An, Jun-Sik
    Jeon, Seong-Goo
    Kim, Il-Hwan
    WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2007, : 176 - 180
  • [46] Commutative Watermarking-Encryption of Audio Data with Minimum Knowledge Verification
    Schmitz, Roland
    Gruber, Jan
    Advances in Multimedia, 2017, 2017
  • [47] Commutative encryption and watermarking based on SVD for secure GIS vector data
    Ren, Na
    Zhao, Ming
    Zhu, Changqing
    Sun, Xiaohui
    Zhao, Yazhou
    EARTH SCIENCE INFORMATICS, 2021, 14 (04) : 2249 - 2263
  • [48] A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images
    Bouslimi, Dalel
    Coatrieux, Gouenou
    Roux, Christian
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2012, 106 (01) : 47 - 54
  • [49] Perceptual rules for watermarking images: A psychophysical study of the visual basis for digital pattern encryption
    Lauritzen, JS
    Pelah, A
    Tolhurst, DJ
    HUMAN VISION AND ELECTRONIC IMAGING IV, 1999, 3644 : 392 - 402
  • [50] A hybrid scheme for encryption and watermarking
    Xu, XW
    Dexter, S
    Eskicioglu, AM
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 725 - 736