A commutative digital image watermarking and encryption method in the tree structured Haar transform domain

被引:92
作者
Cancellaro, M. [1 ]
Battisti, F. [1 ]
Carli, M. [1 ]
Boato, G. [2 ]
De Natale, F. G. B. [2 ]
Neri, A. [1 ]
机构
[1] Univ Roma TRE, Dept Appl Elect, Rome, Italy
[2] Univ Trento, Dept Informat Engn & Comp Sci, Trento, Italy
关键词
Encryption; Watermarking; Key-dependent domain; Tree structured Haar transform; SCHEME;
D O I
10.1016/j.image.2010.11.001
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper a commutative watermarking and ciphering scheme for digital images is presented. The commutative property of the proposed method allows to cipher a watermarked image without interfering with the embedded signal or to watermark an encrypted image still allowing a perfect deciphering. Both operations are performed on a parametric transform domain: the Tree Structured Haar transform. The key dependence of the adopted transform domain increases the security of the overall system. In fact. without the knowledge of the generating key it is not possible to extract any useful information from the ciphered-watermarked image. Experimental results show the effectiveness of the proposed scheme. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 35 条
[21]   Commutative watermarking and encryption for media data [J].
Lian, Shiguo ;
Liu, Zhongxuan ;
Zhen, Ren ;
Wang, Haila .
OPTICAL ENGINEERING, 2006, 45 (08)
[22]  
MALKIN M, 2007, P 8 INT WORKSH INF H
[23]   Overview on selective encryption of image and video: Challenges and perspectives [J].
Massoudi A. ;
Lefebvre F. ;
De Vleeschouwer C. ;
MacQ B. ;
Quisquater J.-J. .
EURASIP Journal on Information Security, 2008 (1)
[24]   On joint coding for watermarking and encryption [J].
Merhav, N .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (01) :190-205
[25]  
Petitcolas FAP, 2000, IEEE SIGNAL PROC MAG, V17, P58, DOI 10.1109/79.879339
[26]  
PETITCOLAS FAP, 1998, P 2 INT WORKSH INF H
[27]   Selective encryption of wavelet-packet encoded image data: efficiency and security [J].
Pommer, A ;
Uhl, A .
MULTIMEDIA SYSTEMS, 2003, 9 (03) :279-287
[28]  
SADEGHI AR, 2007, P 6 INT WORKSH DIG W
[29]  
SAID A, 2005, P IEEE INT C IM PROC
[30]  
SCOPIGNO RM, 2004, P IEEE GLOB TEL C NO