Energy efficient watermarking on mobile devices using proxy-based partitioning

被引:8
作者
Kejariwal, Arun [1 ]
Gupta, Sumit [1 ]
Nicolau, Alexandru [1 ]
Dutt, Nikil D. [1 ]
Gupta, Rajesh [1 ]
机构
[1] Univ Calif Irvine, Dept Comp Sci, Irvine, CA 92697 USA
基金
美国国家科学基金会;
关键词
energy consumption; mobile computing; partitioning; watermarking;
D O I
10.1109/TVLSI.2006.878218
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Digital watermarking embeds an imperceptible signature or watermark in a digital file containing audio, image, text, or video data. The watermark can be used to authenticate the data file and for tamper detection. It is particularly valuable in the use and exchange of digital media, such as audio and video, on emerging handheld devices. However, watermarking is computationally expensive and adds to the drain of the available energy in handheld devices. In this paper, we first analyze the energy profile of various watermarking algorithms. We also study the impact of security and image quality on energy consumption. Second, we present an approach in which we partition the watermarking embedding and extraction algorithms and migrate some tasks to a proxy server. This leads to a lower energy consumption on the handheld without compromising the security of the watermarking process. Experimental results show that executing the watermarking tasks that are partitioned between the proxy and the handheld devices, reduces the total energy consumed by 80%, and improves performance by two orders of magnitude compared to running the application on only the handheld device.
引用
收藏
页码:625 / 636
页数:12
相关论文
共 37 条
[1]  
[Anonymous], 1996, P 2 ANN INT C MOB CO
[2]  
Bruyndonckx O., 1995, P IEEE WORKSH NONL S, P456
[3]  
CORVI M, 1997, P SCAND C IM AN, P157
[4]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[5]  
DAUBECHIES I, COMM PURE APPL MATH, P909
[6]   Protection of wavelet-based watermarking systems using filter parametrization [J].
Dietl, W ;
Meerwald, P ;
Uhl, A .
SIGNAL PROCESSING, 2003, 83 (10) :2095-2116
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]  
DUGAD R, 1998, P INT C IM PROC OCT, P357
[9]   Protecting mobile agents by using traceability techniques [J].
Esparza, O ;
Fernandez, M ;
Soriano, M .
ITRE2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, 2003, :264-268
[10]  
FRIDRICH J, 1998, P INT S OPT SCI ENG, P19