Skip to main content
Log in

Secure and robust color image watermarking scheme using partial homomorphic cryptosystem in ASWDR compressed domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The primary requirement of Secure Signal Processing (SSP) is to protect the identity and content of the transmitted data. To this end, various encryption techniques are employed. Homomorphic encryption in general and Paillier cryptosystem in particular is found to be one such algorithm suitable for image processing applications. It offers additive privacy homomorphism. In this paper, the Paillier encryption is employed for watermarking of six different compressed images in ASWDR (Adaptively Scanned Wavelet Difference Reduction) domain. The results are found to be encouraging both in terms of visual quality and the correlation coefficient values. The proposed watermarking scheme ensures robustness towards selected image processing attacks. The encryption parameters like NPCR (Number of Pixels Change Rate), UACI (Unified Average Changing Intensity) and Encryption Speed are evaluated. The proposed technique is compared with the one in SPIHT (Set Partitioning in Hierarchical Trees) domain. The experimental results obtained for ASWDR compression are better placed in comparison to those obtained by SPIHT compression. The proposed scheme is further analyzed in view of other recent schemes carried out by using RSA as an encryption tool in DWT domain. It is concluded that our proposed scheme is better placed in comparison to this scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abdallah HA, Ghazy RA, Kasban H, Faragallah OS, Shaalan AA, Hadhoud MM, … El-Samie FEA (2014) Homomorphic image watermarking with a singular value decomposition algorithm. Inf Process Manag 50(6):909–923

    Article  Google Scholar 

  2. Boussif M, Aloui N, Cherif A (2018) Secured cloud computing for medical data based on watermarking and encryption. IET Networ 7(5):294–298

    Article  Google Scholar 

  3. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  4. Damgård I, Jurik M (2001) A generalization, a simplification and some applications of Paillier’s probabilistic public-key system. Proc Public-Key Cryptograp:119–136

  5. Elgamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472

    Article  MathSciNet  MATH  Google Scholar 

  6. Gentry C (2009) “Fully homomorphic encryption using ideal lattices,” in Proc. 41st Annu. ACM Symp. Theory Comput. 169–178.

  7. Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135

    Article  Google Scholar 

  8. Gupta R, Mishra A, Jain S (2017) A semi-blind HVS based image watermarking scheme using elliptic curve cryptography. Multimed Tools Appl:1–26

  9. Jindal NS (2012) Performance Analysis of SVD and SPIHT Algorithm for Image Compression Application. Int J 2(2)

  10. Jost C, Lam H, Maximov A, Smeets BJ (2015) Encryption Performance Improvements of the Paillier Cryptosystem. IACR Cryptology ePrint Archive 2015:864

  11. Kumar VVS, Reddy MIS (2012) Image Compression Techniques by using Wavelet Transform. J Inform Eng Appl 2(1)

  12. Liu R, Tan T (2002) An SVD based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128

    Article  Google Scholar 

  13. Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105

    Article  Google Scholar 

  14. Mehta N, Jadhav P, Lupane P, Honrao P, Mahalle P (2013). Group authentication using paillier threshold cryptography. In Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on (1–4). IEEE

  15. Muthumani N, Pavithradevi K (2015) Image Compression Using ASWDR and 3DSPIHT Algorithms for Satellite Data”, in International Journal of Scientific & Engineering Research, 6(10)

  16. Nassar M, Erradi A, & Malluhi QM (2015) Paillier's encryption: implementation and cloud applications. In Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on (1–5). IEEE

  17. O’Keeffe M (2008) The Paillier cryptosystem: A look into the cryptosystem and its potential application. College of New Jersey

  18. Paillier P (1999). Public-key cryptosystems based on composite degree residuosity classes. In International Conference on the Theory and Applications of Cryptographic Techniques (223-238). Springer Berlin.

  19. Petitcolas FA, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems. In: International workshop on information hiding. Springer, Berlin, pp 218–238

    Chapter  Google Scholar 

  20. Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978

    Article  MathSciNet  MATH  Google Scholar 

  21. Said A, Pearlman WA (1996) A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans Circ Syst Video Technol 6(3):243–250

    Article  Google Scholar 

  22. Seong TY, Kwon KC, Lee SH, Moon KS, Kwon KR (2014) DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol. J K Multimed Soc 17(12):1402–1411

    Article  Google Scholar 

  23. Somaraj S, Hussain MA (2015) Performance and Security Analysis for image encryption using Key image. Indian J Sci Technol 8(35)

  24. Sridokmai T, Prakancharoen S (2015). The homomorphic other property of Paillier cryptosystem. In Science and Technology (TICST), 2015 International Conference on (356–359). IEEE

  25. Subramanyam AV, Emmanuel S (2012) Robust watermarking of compressed and encrypted JPEG2000 IMAGES. IEEE Trans Multimed 14(3):130–142

    Article  Google Scholar 

  26. Tebaa, M., El Hajji, S., & El Ghazi, A. (2012). Homomorphic encryption applied to the cloud computing security. In Proceedings of the World Congress on Engineering (Vol. 1, pp. 4-6).

  27. Walker JS, Nguyen TO (2000) Adaptive Scanning Methods for Wavelet Difference Reduction in Lossy Image Compression. Proc IEEE Int Conf Image Proc 3:182–185

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anurag Mishra.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mishra, A., Gupta, R. & Jain, S. Secure and robust color image watermarking scheme using partial homomorphic cryptosystem in ASWDR compressed domain. Multimed Tools Appl 78, 22127–22154 (2019). https://doi.org/10.1007/s11042-019-7452-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7452-4

Keywords

Navigation