Abstract
Image watermark has played an important role in image copyright protection. With the development of cloud computing in recent years, more and more people are willing to outsource the watermark embedding processing to cloud servers. However, the usual watermark embedding is performed in the plaintext domain, which will lead to the leakage of private information. We propose an effective privacy-preserving outsourcing watermark embedding method. We firstly present the batched implementation of discrete cosine transform (DCT) in the encrypted domain using fully homomorphic encryption integrated with Single Instruction Multiple Data (SIMD). The watermark bits are embedded in the DC components of the DCT coefficients in the encrypted domain without any leakage of the original image data. Our experimental results indicate that our secure watermarking scheme has higher efficiency than the compared work.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Singh, K.U., Abu-Hamatta, H.S., Kumar, A., Singhal, A., Rashid, M., Bashir, A.: Secure watermarking scheme for color DICOM images in telemedicine applications. CMC-Comput. Mater. Continua 70(2), 2525–2542 (2022)
Shady, Y., Yassen, A.M., Alsammak, A.K., Elhalawany, B.M.: Local features-based watermarking for image security in social media. CMC-Comput. Mater. Continua 69(3), 3857–3870 (2021)
Zhang, X., Zhang, W., Sun, W., Sun, X., Jha, S.K.: A robust 3-D medical watermarking based on wavelet transform for data protection. Comput. Syst. Sci. Eng. 41(3), pp. 1043–1056 (2022)
Alsehli Abrar, W.A., Ghouzali, S.: Secure image authentication using watermarking and blockchain. Intell. Autom. Soft Comput. 28(2), 577–591 (2022)
Bianchi, T., Piva, A., Barni, M.: On the implementation of the discrete Fourier transform in the encrypted domain. IEEE Trans. Inf. Foren. Secur. 4(1), 86–97 (2009)
Zheng, P., Huang, J.: Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain. IEEE Trans. Image Process. 22(6), 2455–2468 (2013)
Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235–253. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03168-7_14
Hu, X., Zhang, W., Li, K., Hu, H., Yu, N.: Secure nonlocal denoising in outsourced images. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 12(3), 40 (2016)
Jiang, L., Xu, C., Wang, X., Luo, B., Wang, H.: Secure outsourcing sift: efficient and privacy-preserving image feature extraction in the encrypted domain. IEEE Trans. Depend. Secure Comput. 17(1), 179–193 (2017)
Xiong, L., Han, X., Yang, C.N., Shi, Y.Q.: Robust reversible watermarking in encrypted image with secure multi-party based on lightweight cryptography. IEEE Trans. Circ. Syst. Video Technol. 32(1), 75–91 (2021)
Failla, P., Sutcu, Y., Barni, M.: eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, pp. 241–246 (2010)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 223–238. Springer (1999). https://doi.org/10.1007/3-540-48910-X_16
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 169–178 (2009)
Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 409–437. Springer (2017). https://doi.org/10.1007/978-3-319-70694-8_15
Cheon, J.H., Han, K., Kim, A., Kim, M., Song, Y.: Bootstrapping for approximate homomorphic encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 360–384. Springer (2018). https://doi.org/10.1007/978-3-319-78381-9_14
Huang, J., Shi, Y.Q., Shi, Y.: Embedding image watermarks in DC components. IEEE Trans. Circ. Syst. for Video Technol. 10(6), 974–979 (2000)
PALISADE: PALISADE Lattice Cryptography Library (release 1.10.5). https://palisade-crypto.org/ (October 2020)
Acknowledgements
This work was supported in part by the Natural Science Foundation of Guangdong (2019A1515010746, 2022A1515011897), in part by the Science and Technology Projects in Guangzhou (202102080354), in part by the Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness (HNTS2022023).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Fang, X., Lai, R., Zhou, Z., Chen, Z., Zheng, P., Lu, W. (2022). Efficient and Secure Outsourced Image Watermarking in Cloud Computing. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13339. Springer, Cham. https://doi.org/10.1007/978-3-031-06788-4_44
Download citation
DOI: https://doi.org/10.1007/978-3-031-06788-4_44
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06787-7
Online ISBN: 978-3-031-06788-4
eBook Packages: Computer ScienceComputer Science (R0)