Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Reference Hub9
Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms

Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms

Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang
Copyright: © 2014 |Volume: 5 |Issue: 4 |Pages: 17
ISSN: 1947-8534|EISSN: 1947-8542|EISBN13: 9781466655645|DOI: 10.4018/ijmdem.2014100103
Cite Article Cite Article

MLA

Schmitz, Roland, et al. "Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms." IJMDEM vol.5, no.4 2014: pp.36-52. http://doi.org/10.4018/ijmdem.2014100103

APA

Schmitz, R., Li, S., Grecos, C., & Zhang, X. (2014). Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms. International Journal of Multimedia Data Engineering and Management (IJMDEM), 5(4), 36-52. http://doi.org/10.4018/ijmdem.2014100103

Chicago

Schmitz, Roland, et al. "Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms," International Journal of Multimedia Data Engineering and Management (IJMDEM) 5, no.4: 36-52. http://doi.org/10.4018/ijmdem.2014100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Invariant Commutative Watermarking-Encryption means to use a cipher that does not have any impact on a certain feature space, which can thus be used for embedding watermarks either before or after encryption. For example, histogram-based watermarking schemes are invariant to pixel permutations and can be combined with permutation-based ciphers to form a Commutative Watermarking-Encryption (CWE) scheme. However, typical histogram-based watermarking schemes based on comparison of histogram bins are prone to de-synchronization attacks, where the whole histogram is shifted by a certain amount. In this paper the authors investigate the possibility to avoid this kind of attacks by synchronizing the embedding and detection processes, using the mean of the histogram as a calibration point. The resulting watermarking scheme is resistant to three common types of shifts of the histogram, while the advantages of previous histogram-based schemes, especially commutativity of watermarking and permutation-based encryption, are preserved. The authors also report on the results of testing robustness of the scheme against JPEG and JPEG2000 compression.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.