Skip to main content
Log in

Joint watermarking and encryption for still visual data

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Joint watermarking and encryption is an upcoming security solution that combines leading but complementary techniques to achieve an enhanced security level. Real time applications using joint watermarking and encryption framework has three requirements: data to be efficiently compressed, watermarking technique to sustain compression, and encryption technique to be developed in a way so as not to disturb the compression efficiency. Finding an optimal solution that combines the three techniques while fulfilling these requirements is a challenging problem. This paper thus, proposes a wavelet domain based joint watermarking and encryption framework that employs singular value decomposition based watermark embedding and sign bit encryption prior to compression. The varying significance of different subbands has been considered to encrypt the data without adversely effecting the compression ratio. Experimental analysis using various evaluation parameters and attack scenarios has revealed the ability of the proposed framework to prove content-ownership, even from the encrypted data. Comparative analysis with the existing techniques reflect its ability to provide better security with less computational resources. This makes it a preferable solution for data security at all stages of data archival, transmission or distribution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Boato G, Conci N, Conotter V, De Natale FGB, Fontanari C (2008) Multimedia asymmetric watermarking and encryption. Electronics Lett 44(9):601–602

    Article  Google Scholar 

  2. Chang FC, Huang HC, Hang HM (2007) Layered access control schemes on watermarked scalable media. J VLSI Signal Process Syst Signal Image Video Technol 49(3):443–455

    Article  Google Scholar 

  3. Committee on Intellectual Property Rights in the Emerging Information Infrastructure (2000) The digital dilemma: intellectual property in the information age. US National Research Council, National Academic Press, Washington, D.C.

    Google Scholar 

  4. Dewilde P, Deprettere EdF (1988) Singular value decomposition. An introduction. In: Deprettere EdF (ed) SVD and signal process.: algorithms, applications, and architectures. Elsevier Science Publishers, North Holland, pp 3–41

    Google Scholar 

  5. Eskicioglu AM (2003) Protecting intellectual property in digital multimedia networks. IEEE Comput 36(7):39–45

    Article  Google Scholar 

  6. Eskicioglu AM (2003) Multimedia security in group communications: recent progress in key management, authentication, and watermarking. Multimedia Syst 9:239–248

    Article  Google Scholar 

  7. Huang HC, Chen YH (2009) Genetic fingerprinting for copyright protection of multicast media. Soft Comput 13(4):383–391

    Article  Google Scholar 

  8. Kundur D, Hatzinakos D (2004) Towards robust logo watermarking using multiresolution image fusion. IEEE Trans Multimedia 6(1):185–197

    Article  Google Scholar 

  9. Li B, He J, Huang JW, Shi YQ (2011) A survey on image steganography and steganalysis. J Inf Hiding Multimedia Sig Proc 2(2):142–172

    Google Scholar 

  10. Lian S, Liu Z, Zhen R, Wang H (2006) Commutative watermarking and encryption for media data. Optical Engg Lett 45(8):1–3

    Google Scholar 

  11. Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. IEEE Trans Circuits Syst Video Technol 17(6):774–778

    Article  Google Scholar 

  12. Lian S (2009) Quasi-commutative watermarking and encryption for secure media content distribution. Multimed Tools Appl 43(1):91–107

    Article  Google Scholar 

  13. Liu J-L (2006) Effective selective encryption for Jpeg2000 images using private initial table. Pattern Recogn 39:1509–1517

    Article  MATH  Google Scholar 

  14. Mao Y, Wu M (2006) A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans Image Process 15(7):2061–2075

    Article  Google Scholar 

  15. Peterson G (1997) Arnold’s cat map. Available from: http:online.redwoods.cc.ca.us/instruct/darnold/maw/catmap3.htm

  16. Pommer A, Uhl A (2003) Selective encryption of wavelet-packet encoded image data: Efficiency and security. Multimedia Syst 9(3):279–287

    Article  Google Scholar 

  17. Said A, Pearlman WA (1996) A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans Circuits Syst Video Technol 6(3):243–250

    Article  Google Scholar 

  18. Schneier B (1995) Applied cryptography second edition: protocols, algorithms, and source code in C. Wiley, New York

    Google Scholar 

  19. Simitopoulos D, Zissis N, Georgiadis P, Emmanouilidis V, Strintzis MG (2003) Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. Multimedia Security 9(3):217–227

    Article  Google Scholar 

  20. Su K, Kundur D, Hatzinakos D (2005) Statistical invisibility in collusion-resistant digital video watermarking. IEEE Trans Multimedia 7(1):43–51

    Article  Google Scholar 

  21. Wu T, Wu S (1997) Selective encryption and watermarking of MPEG video. In: Proc. int. conf. image science, systems and technology. Ontario, Canada

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nidhi Taneja.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Taneja, N., Bhatnagar, G., Raman, B. et al. Joint watermarking and encryption for still visual data. Multimed Tools Appl 67, 593–606 (2013). https://doi.org/10.1007/s11042-012-1037-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1037-9

Keywords

Navigation