Skip to main content

Efficient and Secure Outsourced Image Watermarking in Cloud Computing

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13339))

Abstract

Image watermark has played an important role in image copyright protection. With the development of cloud computing in recent years, more and more people are willing to outsource the watermark embedding processing to cloud servers. However, the usual watermark embedding is performed in the plaintext domain, which will lead to the leakage of private information. We propose an effective privacy-preserving outsourcing watermark embedding method. We firstly present the batched implementation of discrete cosine transform (DCT) in the encrypted domain using fully homomorphic encryption integrated with Single Instruction Multiple Data (SIMD). The watermark bits are embedded in the DC components of the DCT coefficients in the encrypted domain without any leakage of the original image data. Our experimental results indicate that our secure watermarking scheme has higher efficiency than the compared work.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Singh, K.U., Abu-Hamatta, H.S., Kumar, A., Singhal, A., Rashid, M., Bashir, A.: Secure watermarking scheme for color DICOM images in telemedicine applications. CMC-Comput. Mater. Continua 70(2), 2525–2542 (2022)

    Article  Google Scholar 

  2. Shady, Y., Yassen, A.M., Alsammak, A.K., Elhalawany, B.M.: Local features-based watermarking for image security in social media. CMC-Comput. Mater. Continua 69(3), 3857–3870 (2021)

    Article  Google Scholar 

  3. Zhang, X., Zhang, W., Sun, W., Sun, X., Jha, S.K.: A robust 3-D medical watermarking based on wavelet transform for data protection. Comput. Syst. Sci. Eng. 41(3), pp. 1043–1056 (2022)

    Google Scholar 

  4. Alsehli Abrar, W.A., Ghouzali, S.: Secure image authentication using watermarking and blockchain. Intell. Autom. Soft Comput. 28(2), 577–591 (2022)

    Article  Google Scholar 

  5. Bianchi, T., Piva, A., Barni, M.: On the implementation of the discrete Fourier transform in the encrypted domain. IEEE Trans. Inf. Foren. Secur. 4(1), 86–97 (2009)

    Article  Google Scholar 

  6. Zheng, P., Huang, J.: Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain. IEEE Trans. Image Process. 22(6), 2455–2468 (2013)

    Article  MathSciNet  Google Scholar 

  7. Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235–253. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03168-7_14

    Chapter  Google Scholar 

  8. Hu, X., Zhang, W., Li, K., Hu, H., Yu, N.: Secure nonlocal denoising in outsourced images. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 12(3), 40 (2016)

    Google Scholar 

  9. Jiang, L., Xu, C., Wang, X., Luo, B., Wang, H.: Secure outsourcing sift: efficient and privacy-preserving image feature extraction in the encrypted domain. IEEE Trans. Depend. Secure Comput. 17(1), 179–193 (2017)

    Article  Google Scholar 

  10. Xiong, L., Han, X., Yang, C.N., Shi, Y.Q.: Robust reversible watermarking in encrypted image with secure multi-party based on lightweight cryptography. IEEE Trans. Circ. Syst. Video Technol. 32(1), 75–91 (2021)

    Article  Google Scholar 

  11. Failla, P., Sutcu, Y., Barni, M.: eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, pp. 241–246 (2010)

    Google Scholar 

  12. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 223–238. Springer (1999). https://doi.org/10.1007/3-540-48910-X_16

  13. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 169–178 (2009)

    Google Scholar 

  14. Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 409–437. Springer (2017). https://doi.org/10.1007/978-3-319-70694-8_15

  15. Cheon, J.H., Han, K., Kim, A., Kim, M., Song, Y.: Bootstrapping for approximate homomorphic encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 360–384. Springer (2018). https://doi.org/10.1007/978-3-319-78381-9_14

  16. Huang, J., Shi, Y.Q., Shi, Y.: Embedding image watermarks in DC components. IEEE Trans. Circ. Syst. for Video Technol. 10(6), 974–979 (2000)

    Article  Google Scholar 

  17. PALISADE: PALISADE Lattice Cryptography Library (release 1.10.5). https://palisade-crypto.org/ (October 2020)

Download references

Acknowledgements

This work was supported in part by the Natural Science Foundation of Guangdong (2019A1515010746, 2022A1515011897), in part by the Science and Technology Projects in Guangzhou (202102080354), in part by the Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness (HNTS2022023).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peijia Zheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fang, X., Lai, R., Zhou, Z., Chen, Z., Zheng, P., Lu, W. (2022). Efficient and Secure Outsourced Image Watermarking in Cloud Computing. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13339. Springer, Cham. https://doi.org/10.1007/978-3-031-06788-4_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06788-4_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06787-7

  • Online ISBN: 978-3-031-06788-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics