Skip to main content

Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy

  • Conference paper
  • First Online:
Advanced Concepts for Intelligent Vision Systems (ACIVS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 9386))

Abstract

Content-fragile commutative watermarking-encryption requires that both the content-fragile image signature and the watermarking process are invariant under encryption. The pixel entropy, being dependent on first-order image statistics only, is invariant under permutations. In the present paper we embed semi-fragile signatures based on pixel entropy by using a histogram-based watermarking algorithm, which is also invariant to permutations. We also show how the problem of collisions, i.e. different images having the same signature, can be overcome in this approach, if embedder and encryptor share a common secret.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Battisti, F., Cancellaro, M., Boato, G., Carli, M., Neri, A.: Joint watermarking and encryption of color images in the Fibonacci-Haar domain. EURASIP J. Advances in Signal Processing, Article ID 938515 (2009)

    Google Scholar 

  2. Boato, G., Conotter, V., De Natale, F.G.B., Fontanari, C.: A joint asymmetric watermarking and image encryption scheme. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Proc. SPIE, vol. 6819, p. 68191A (2008)

    Google Scholar 

  3. Chrysochos, E., Fotopoulos, V., Skodras, A.N., Xenos, M.: Reversible image watermarking based on histogram modification. In: Proc. 11th Panhellenic Conf. Informatics (PCI 2007), pp. 93–104 (2007)

    Google Scholar 

  4. Guo, J., Zheng, P., Huang, J.: Secure watermarking scheme against watermark attacks in the encrypted domain. Journal of Visual Communication and Image Representation 30, 125–135 (2015)

    Article  Google Scholar 

  5. Lemma, A., Katzenbeisser, S., Celik, M.U., van der Veen, M.: Secure watermark embedding through partial encryption. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 433–445. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Lian, S.: Quasi-commutative watermarking and encryption for secure media content distribution. Multimedia Tools and Applications 43(1), 91–107 (2009)

    Article  Google Scholar 

  7. Schmitz, R., Li, S., Grecos, C., Zhang, X.: Towards more robust commutative watermarking-encryption of images. In: 2013 IEEE International Symposium on Multimedia (ISM), pp. 283–286, December 2013

    Google Scholar 

  8. Schmitz, R., Li, S., Grecos, C., Zhang, X.: A new approach to commutative watermarking-encryption. In: De Decker, B., Chadwick, D.W. (eds.) CMS 2012. LNCS, vol. 7394, pp. 117–130. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  9. Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proceedings of the International Conference on Image Processing, vol. 3, pp. 227–230, September 1996

    Google Scholar 

  10. Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379–423 (1948)

    Article  MATH  MathSciNet  Google Scholar 

  11. Thiemert, S., Sahbi, H., Steinebach, M.: Using entropy for image and video authentication watermarks. In: Proc. SPIE, vol. 6072, pp. 607218-1–607218-10 (2006)

    Google Scholar 

  12. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 13(4), 600–612 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roland Schmitz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Schmitz, R., Li, S., Grecos, C., Zhang, X. (2015). Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy. In: Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D., Scheunders, P. (eds) Advanced Concepts for Intelligent Vision Systems. ACIVS 2015. Lecture Notes in Computer Science(), vol 9386. Springer, Cham. https://doi.org/10.1007/978-3-319-25903-1_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25903-1_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25902-4

  • Online ISBN: 978-3-319-25903-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics