Joint Image Encryption and Screen-Cam Robust Two Watermarking Scheme

被引:15
作者
Chen, Weitong [1 ,2 ,3 ]
Ren, Na [1 ,2 ,3 ]
Zhu, Changqing [1 ,2 ,3 ]
Keskinarkaus, Anja [4 ]
Seppanen, Tapio [4 ]
Zhou, Qifei [1 ,2 ,3 ]
机构
[1] Nanjing Normal Univ, Minist Educ, Key Lab Virtual Geog Environm, Nanjing 210023, Peoples R China
[2] State Key Lab Cultivat Base Geog Environm Evolut, Nanjing 210023, Peoples R China
[3] Jiangsu Ctr Collaborat Innovat Geog Informat Reso, Nanjing 210023, Peoples R China
[4] Univ Oulu, Ctr Machine Vis & Signal Anal, Physiol Signal Anal Team, Oulu 90014, Finland
基金
中国国家自然科学基金;
关键词
image encryption; chaotic mapping; screen-cam process; robust watermarking; discrete fourier transform; smartphone;
D O I
10.3390/s21030701
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This paper proposes a joint encryption and screen-cam robust watermarking scheme. This method combines the advantages of smartphone, encryption and watermarking technologies, thereby achieving watermark extraction with a smartphone, partial decryption and tracking leakage from sneak shots. We design a dual watermarking algorithm to achieve watermark detection from both encrypted and decrypted images. First, a watermark is embedded in the discrete Fourier transform (DFT) domain to enable leakage tracking. Then, a second watermark is generated based on QR (Quick response) code encoding and inverse DFT to achieve high watermark capacity and error correction ability, where the secret key for decryption is included in the watermark message. By hiding this message carrying the watermark for the encrypted image in the changes caused by embedding the first watermark, we can improve imperceptibility and will not affect the effectiveness of the proposed scheme. Finally, to enhance the robustness of watermark after encryption, a chaotic mapping-based segment encryption algorithm is proposed. In the process of watermark detection, to cope with perspective correction, a frame locating based algorithm is employed to achieve watermark synchronization from a recaptured picture of the encrypted image. Considering the severe quality degradation, we use a noise component and local statistic feature-based method to extract the message bits. The experimental results show that the proposed scheme is secure, and highly robust, to screen-cam the process for both before and after decryption. Additionally, after decryption, the proposed scheme also has high robustness against common image processing attacks.
引用
收藏
页码:1 / 28
页数:27
相关论文
共 73 条
  • [31] Image watermarking with a directed periodic pattern to embed multibit messages resilient to print-scan and compound attacks
    Keskinarkaus, A.
    Pramila, A.
    Seppanen, T.
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (10) : 1715 - 1725
  • [32] Keskinarkaus A, 2006, LECT NOTES COMPUT SC, V4283, P82
  • [33] Kumari M, 2017, 3D RES, V8, DOI 10.1007/s13319-017-0148-5
  • [34] Commutative fragile zero-watermarking and encryption for image integrity protection
    Li, Ming
    Xiao, Di
    Zhu, Ye
    Zhang, Yushu
    Sun, Lin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (16) : 22727 - 22742
  • [35] A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation
    Li, Yueping
    Wang, Chunhua
    Chen, Hua
    [J]. OPTICS AND LASERS IN ENGINEERING, 2017, 90 : 238 - 246
  • [36] Robust and hierarchical watermarking of encrypted images based on Compressive Sensing
    Liu, Hong
    Xiao, Di
    Zhang, Rui
    Zhang, Yushu
    Bai, Sen
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2016, 45 : 41 - 51
  • [37] Asymmetric color image encryption scheme using 2D discrete-time map
    Liu, Hongjun
    Kadir, Abdurahman
    [J]. SIGNAL PROCESSING, 2015, 113 : 104 - 112
  • [38] A Remote-Sensing Image Encryption Scheme Using DNA Bases Probability and Two-Dimensional Logistic Map
    Liu, Hui
    Zhao, Bo
    Huang, Linquan
    [J]. IEEE ACCESS, 2019, 7 : 65450 - 65459
  • [39] A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction
    Liu, Jianyi
    Zhao, Kaifeng
    Zhang, Ru
    [J]. CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2020, 39 (07) : 3532 - 3552
  • [40] Cryptanalysis and Improvement in a Plaintext-Related Image Encryption Scheme Based on Hyper Chaos
    Liu, Lidong
    Zhang, Zhaolun
    Chen, Ruijie
    [J]. IEEE ACCESS, 2019, 7 : 126450 - 126463