Abstract
Content-fragile commutative watermarking-encryption requires that both the content-fragile image signature and the watermarking process are invariant under encryption. The pixel entropy, being dependent on first-order image statistics only, is invariant under permutations. In the present paper we embed semi-fragile signatures based on pixel entropy by using a histogram-based watermarking algorithm, which is also invariant to permutations. We also show how the problem of collisions, i.e. different images having the same signature, can be overcome in this approach, if embedder and encryptor share a common secret.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Battisti, F., Cancellaro, M., Boato, G., Carli, M., Neri, A.: Joint watermarking and encryption of color images in the Fibonacci-Haar domain. EURASIP J. Advances in Signal Processing, Article ID 938515 (2009)
Boato, G., Conotter, V., De Natale, F.G.B., Fontanari, C.: A joint asymmetric watermarking and image encryption scheme. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Proc. SPIE, vol. 6819, p. 68191A (2008)
Chrysochos, E., Fotopoulos, V., Skodras, A.N., Xenos, M.: Reversible image watermarking based on histogram modification. In: Proc. 11th Panhellenic Conf. Informatics (PCI 2007), pp. 93–104 (2007)
Guo, J., Zheng, P., Huang, J.: Secure watermarking scheme against watermark attacks in the encrypted domain. Journal of Visual Communication and Image Representation 30, 125–135 (2015)
Lemma, A., Katzenbeisser, S., Celik, M.U., van der Veen, M.: Secure watermark embedding through partial encryption. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 433–445. Springer, Heidelberg (2006)
Lian, S.: Quasi-commutative watermarking and encryption for secure media content distribution. Multimedia Tools and Applications 43(1), 91–107 (2009)
Schmitz, R., Li, S., Grecos, C., Zhang, X.: Towards more robust commutative watermarking-encryption of images. In: 2013 IEEE International Symposium on Multimedia (ISM), pp. 283–286, December 2013
Schmitz, R., Li, S., Grecos, C., Zhang, X.: A new approach to commutative watermarking-encryption. In: De Decker, B., Chadwick, D.W. (eds.) CMS 2012. LNCS, vol. 7394, pp. 117–130. Springer, Heidelberg (2012)
Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proceedings of the International Conference on Image Processing, vol. 3, pp. 227–230, September 1996
Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379–423 (1948)
Thiemert, S., Sahbi, H., Steinebach, M.: Using entropy for image and video authentication watermarks. In: Proc. SPIE, vol. 6072, pp. 607218-1–607218-10 (2006)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 13(4), 600–612 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Schmitz, R., Li, S., Grecos, C., Zhang, X. (2015). Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy. In: Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D., Scheunders, P. (eds) Advanced Concepts for Intelligent Vision Systems. ACIVS 2015. Lecture Notes in Computer Science(), vol 9386. Springer, Cham. https://doi.org/10.1007/978-3-319-25903-1_41
Download citation
DOI: https://doi.org/10.1007/978-3-319-25903-1_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25902-4
Online ISBN: 978-3-319-25903-1
eBook Packages: Computer ScienceComputer Science (R0)