Joint Image Encryption and Screen-Cam Robust Two Watermarking Scheme

被引:15
作者
Chen, Weitong [1 ,2 ,3 ]
Ren, Na [1 ,2 ,3 ]
Zhu, Changqing [1 ,2 ,3 ]
Keskinarkaus, Anja [4 ]
Seppanen, Tapio [4 ]
Zhou, Qifei [1 ,2 ,3 ]
机构
[1] Nanjing Normal Univ, Minist Educ, Key Lab Virtual Geog Environm, Nanjing 210023, Peoples R China
[2] State Key Lab Cultivat Base Geog Environm Evolut, Nanjing 210023, Peoples R China
[3] Jiangsu Ctr Collaborat Innovat Geog Informat Reso, Nanjing 210023, Peoples R China
[4] Univ Oulu, Ctr Machine Vis & Signal Anal, Physiol Signal Anal Team, Oulu 90014, Finland
基金
中国国家自然科学基金;
关键词
image encryption; chaotic mapping; screen-cam process; robust watermarking; discrete fourier transform; smartphone;
D O I
10.3390/s21030701
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This paper proposes a joint encryption and screen-cam robust watermarking scheme. This method combines the advantages of smartphone, encryption and watermarking technologies, thereby achieving watermark extraction with a smartphone, partial decryption and tracking leakage from sneak shots. We design a dual watermarking algorithm to achieve watermark detection from both encrypted and decrypted images. First, a watermark is embedded in the discrete Fourier transform (DFT) domain to enable leakage tracking. Then, a second watermark is generated based on QR (Quick response) code encoding and inverse DFT to achieve high watermark capacity and error correction ability, where the secret key for decryption is included in the watermark message. By hiding this message carrying the watermark for the encrypted image in the changes caused by embedding the first watermark, we can improve imperceptibility and will not affect the effectiveness of the proposed scheme. Finally, to enhance the robustness of watermark after encryption, a chaotic mapping-based segment encryption algorithm is proposed. In the process of watermark detection, to cope with perspective correction, a frame locating based algorithm is employed to achieve watermark synchronization from a recaptured picture of the encrypted image. Considering the severe quality degradation, we use a noise component and local statistic feature-based method to extract the message bits. The experimental results show that the proposed scheme is secure, and highly robust, to screen-cam the process for both before and after decryption. Additionally, after decryption, the proposed scheme also has high robustness against common image processing attacks.
引用
收藏
页码:1 / 28
页数:27
相关论文
共 73 条
  • [1] A new hybrid digital chaotic system with applications in image encryption
    Alawida, Moatsum
    Samsudin, Azman
    Sen Teh, Je
    Alkhawaldeh, Rami S.
    [J]. SIGNAL PROCESSING, 2019, 160 : 45 - 58
  • [2] Digital Image Watermarking Techniques: A Review
    Begum, Mahbuba
    Uddin, Mohammad Shorif
    [J]. INFORMATION, 2020, 11 (02)
  • [3] Multimedia asymmetric watermarking and encryption
    Boato, G.
    Conci, N.
    Conotter, V.
    De Natale, F. G. B.
    Fontanari, C.
    [J]. ELECTRONICS LETTERS, 2008, 44 (09) : 601 - 602
  • [4] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [5] A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
    Cancellaro, M.
    Battisti, F.
    Carli, M.
    Boato, G.
    De Natale, F. G. B.
    Neri, A.
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (01) : 1 - 12
  • [6] Cryptographic Hierarchical Access Control for Dynamic Structures
    Castiglione, Arcangelo
    De Santis, Alfredo
    Masucci, Barbara
    Palmieri, Francesco
    Castiglione, Aniello
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2349 - 2364
  • [7] Identification Recovery Scheme using Quick Response (QR) Code and Watermarking Technique
    Chen, Ji-Hong
    Chen, Wen-Yuan
    Chen, Chin-Hsing
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (02): : 585 - 596
  • [8] Screen-Cam Robust Image Watermarking with Feature-Based Synchronization
    Chen, Weitong
    Ren, Na
    Zhu, Changqing
    Zhou, Qifei
    Seppanen, Tapio
    Keskinarkaus, Anja
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (21): : 1 - 27
  • [9] Screen-Cam Robust and Blind Watermarking for Tile Satellite Images
    Chen, Weitong
    Zhu, Changqing
    Ren, Na
    Seppanen, Tapio
    Keskinarkaus, Anja
    [J]. IEEE ACCESS, 2020, 8 (08): : 125274 - 125294
  • [10] A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms
    Chen, Yu-Chi
    Hung, Tsung-Hsuan
    Hsieh, Sung-Hsien
    Shiu, Chih-Wei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) : 3332 - 3343