A robust watermarking algorithm for encrypted medical images based on DCT encrypted domain

被引:0
作者
Dong, Jiangtao [1 ]
Li, Jingbing [1 ]
Duan, Yucong [1 ]
机构
[1] Hainan Univ, Coll Informat Sci & Technol, Haikou, Peoples R China
来源
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ELECTRONIC SCIENCE AND AUTOMATION CONTROL | 2015年 / 20卷
关键词
Robustness; encrypted domain; DCT; Logistic chaotic map; zero-watermarking; CHAOTIC STANDARD; SCHEME;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing watermarking schemes were designed to embed the watermark information into the original images, which are vulnerable to unauthorized access. In this paper, we have proposed a novel and feasible watermarking algorithm in the encrypted domain. First, we encrypted both original medical image and watermark image by using DCT and Logistic map; Then we embedded watermark into the encrypted medical image. In watermarking embedding and extraction phase, zero-watermarking technique has been utilized to ensure the integrity of medical images. At the end of the paper, we compared the robustness of watermarking algorithm between the unencrypted and encrypted approaches. Results demonstrate that in encrypted domain the proposed algorithm is not only robust against common image process such as Gaussian noise, JPEG compression, median filtering, but can also withstand levels of geometric distortions, which can be utilized in information protection of both original medical images and the watermark images.
引用
收藏
页码:140 / 143
页数:4
相关论文
共 15 条
[1]  
[Anonymous], 1978, FDN SEC COMPUT
[2]   Encrypted domain DCT based on homomorphic cryptosystems [J].
Bianchi T. ;
Piva A. ;
Barni M. .
EURASIP Journal on Information Security, 2009 (1)
[3]   On the Implementation of the Discrete Fourier Transform in the Encrypted Domain [J].
Bianchi, Tiziano ;
Piva, Alessandro ;
Barni, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) :86-97
[4]  
Bin Muhaya F, 2009, LECT NOTES COMPUT SC, V5754, P1014, DOI 10.1007/978-3-642-04070-2_107
[5]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[6]   Image encryption for secure Internet multimedia applications [J].
Dang, PP ;
Chau, PM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (03) :395-403
[7]   Secure watermarking scheme against watermark attacks in the encrypted domain [J].
Guo, Jianting ;
Zheng, Peijia ;
Huang, Jiwu .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 30 :125-135
[8]   An efficient and robust image encryption scheme for medical applications [J].
Kanso, A. ;
Ghebleh, M. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 24 (1-3) :98-116
[9]  
Menezes A.J., HDB APPL CRYPTOGRAPH
[10]   Modified substitution-diffusion image cipher using chaotic standard and logistic maps [J].
Patidar, Vinod ;
Pareek, N. K. ;
Purohit, G. ;
Sud, K. K. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (10) :2755-2765