Joint Image Encryption and Screen-Cam Robust Two Watermarking Scheme

被引:15
作者
Chen, Weitong [1 ,2 ,3 ]
Ren, Na [1 ,2 ,3 ]
Zhu, Changqing [1 ,2 ,3 ]
Keskinarkaus, Anja [4 ]
Seppanen, Tapio [4 ]
Zhou, Qifei [1 ,2 ,3 ]
机构
[1] Nanjing Normal Univ, Minist Educ, Key Lab Virtual Geog Environm, Nanjing 210023, Peoples R China
[2] State Key Lab Cultivat Base Geog Environm Evolut, Nanjing 210023, Peoples R China
[3] Jiangsu Ctr Collaborat Innovat Geog Informat Reso, Nanjing 210023, Peoples R China
[4] Univ Oulu, Ctr Machine Vis & Signal Anal, Physiol Signal Anal Team, Oulu 90014, Finland
基金
中国国家自然科学基金;
关键词
image encryption; chaotic mapping; screen-cam process; robust watermarking; discrete fourier transform; smartphone;
D O I
10.3390/s21030701
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This paper proposes a joint encryption and screen-cam robust watermarking scheme. This method combines the advantages of smartphone, encryption and watermarking technologies, thereby achieving watermark extraction with a smartphone, partial decryption and tracking leakage from sneak shots. We design a dual watermarking algorithm to achieve watermark detection from both encrypted and decrypted images. First, a watermark is embedded in the discrete Fourier transform (DFT) domain to enable leakage tracking. Then, a second watermark is generated based on QR (Quick response) code encoding and inverse DFT to achieve high watermark capacity and error correction ability, where the secret key for decryption is included in the watermark message. By hiding this message carrying the watermark for the encrypted image in the changes caused by embedding the first watermark, we can improve imperceptibility and will not affect the effectiveness of the proposed scheme. Finally, to enhance the robustness of watermark after encryption, a chaotic mapping-based segment encryption algorithm is proposed. In the process of watermark detection, to cope with perspective correction, a frame locating based algorithm is employed to achieve watermark synchronization from a recaptured picture of the encrypted image. Considering the severe quality degradation, we use a noise component and local statistic feature-based method to extract the message bits. The experimental results show that the proposed scheme is secure, and highly robust, to screen-cam the process for both before and after decryption. Additionally, after decryption, the proposed scheme also has high robustness against common image processing attacks.
引用
收藏
页码:1 / 28
页数:27
相关论文
共 73 条
  • [51] An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images
    Puteaux, Pauline
    Puech, William
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (07) : 1670 - 1681
  • [52] Reversible data hiding in encrypted images using adaptive reversible integer transformation
    Qiu, Yingqiang
    Qian, Zhenxing
    Zeng, Huanqiang
    Lin, Xiaodan
    Zhang, Xinpeng
    [J]. SIGNAL PROCESSING, 2020, 167
  • [53] Commutative Encryption and Watermarking Algorithm Based on Feature Invariants for Secure Vector Map
    Ren, Na
    Zhu, Changqing
    Tong, Deyu
    Chen, Weitong
    Zhou, Qifei
    [J]. IEEE ACCESS, 2020, 8 : 221481 - 221493
  • [54] Robust Fourier Watermarking for ID Images on Smart Card Plastic Supports
    Riad, Rabia
    Harba, Rachid
    Douzi, Hassan
    Ros, Frederic
    Elhajji, Mohamed
    [J]. ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2016, 16 (04) : 23 - 30
  • [55] CamMark: Analyzing, Modeling, and Simulating Artifacts in Camcorder Copies
    Schaber, Philipp
    Kopf, Stephan
    Wetzel, Sina
    Ballast, Tyler
    Wesch, Christoph
    Effelsberg, Wolfgang
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2015, 11 (02)
  • [56] Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms
    Schmitz, Roland
    Li, Shujun
    Grecos, Christos
    Zhang, Xinpeng
    [J]. INTERNATIONAL JOURNAL OF MULTIMEDIA DATA ENGINEERING & MANAGEMENT, 2014, 5 (04) : 36 - 52
  • [57] An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment
    Senthilnathan, T.
    Prabu, P.
    Sivakumar, R.
    Sakthivel, S.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 12839 - 12847
  • [58] Reversible Data Hiding: Advances in the Past Two Decades
    Shi, Yun-Qing
    Li, Xiaolong
    Zhang, Xinpeng
    Wu, Hao-Tian
    Ma, Bin
    [J]. IEEE ACCESS, 2016, 4 : 3210 - 3237
  • [59] An Interpolative AMBTC-based high-payload RDH scheme for encrypted images
    Shiu, Pei-Feng
    Tai, Wei-Liang
    Jan, Jinn-Ke
    Chang, Chin-Chen
    Lin, Chia-Chen
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 74 : 64 - 77
  • [60] Digital Watermarking Based On Two-way Arnold Transform and QR Code
    Su, Yang
    Han, Peng
    Jia, Zhujun
    Liang, Shihua
    [J]. MANUFACTURING ENGINEERING AND AUTOMATION II, PTS 1-3, 2012, 591-593 : 2564 - +