Abstract
The primary requirement of Secure Signal Processing (SSP) is to protect the identity and content of the transmitted data. To this end, various encryption techniques are employed. Homomorphic encryption in general and Paillier cryptosystem in particular is found to be one such algorithm suitable for image processing applications. It offers additive privacy homomorphism. In this paper, the Paillier encryption is employed for watermarking of six different compressed images in ASWDR (Adaptively Scanned Wavelet Difference Reduction) domain. The results are found to be encouraging both in terms of visual quality and the correlation coefficient values. The proposed watermarking scheme ensures robustness towards selected image processing attacks. The encryption parameters like NPCR (Number of Pixels Change Rate), UACI (Unified Average Changing Intensity) and Encryption Speed are evaluated. The proposed technique is compared with the one in SPIHT (Set Partitioning in Hierarchical Trees) domain. The experimental results obtained for ASWDR compression are better placed in comparison to those obtained by SPIHT compression. The proposed scheme is further analyzed in view of other recent schemes carried out by using RSA as an encryption tool in DWT domain. It is concluded that our proposed scheme is better placed in comparison to this scheme.
Similar content being viewed by others
References
Abdallah HA, Ghazy RA, Kasban H, Faragallah OS, Shaalan AA, Hadhoud MM, … El-Samie FEA (2014) Homomorphic image watermarking with a singular value decomposition algorithm. Inf Process Manag 50(6):909–923
Boussif M, Aloui N, Cherif A (2018) Secured cloud computing for medical data based on watermarking and encryption. IET Networ 7(5):294–298
Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Damgård I, Jurik M (2001) A generalization, a simplification and some applications of Paillier’s probabilistic public-key system. Proc Public-Key Cryptograp:119–136
Elgamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472
Gentry C (2009) “Fully homomorphic encryption using ideal lattices,” in Proc. 41st Annu. ACM Symp. Theory Comput. 169–178.
Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135
Gupta R, Mishra A, Jain S (2017) A semi-blind HVS based image watermarking scheme using elliptic curve cryptography. Multimed Tools Appl:1–26
Jindal NS (2012) Performance Analysis of SVD and SPIHT Algorithm for Image Compression Application. Int J 2(2)
Jost C, Lam H, Maximov A, Smeets BJ (2015) Encryption Performance Improvements of the Paillier Cryptosystem. IACR Cryptology ePrint Archive 2015:864
Kumar VVS, Reddy MIS (2012) Image Compression Techniques by using Wavelet Transform. J Inform Eng Appl 2(1)
Liu R, Tan T (2002) An SVD based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128
Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105
Mehta N, Jadhav P, Lupane P, Honrao P, Mahalle P (2013). Group authentication using paillier threshold cryptography. In Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on (1–4). IEEE
Muthumani N, Pavithradevi K (2015) Image Compression Using ASWDR and 3DSPIHT Algorithms for Satellite Data”, in International Journal of Scientific & Engineering Research, 6(10)
Nassar M, Erradi A, & Malluhi QM (2015) Paillier's encryption: implementation and cloud applications. In Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on (1–5). IEEE
O’Keeffe M (2008) The Paillier cryptosystem: A look into the cryptosystem and its potential application. College of New Jersey
Paillier P (1999). Public-key cryptosystems based on composite degree residuosity classes. In International Conference on the Theory and Applications of Cryptographic Techniques (223-238). Springer Berlin.
Petitcolas FA, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems. In: International workshop on information hiding. Springer, Berlin, pp 218–238
Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978
Said A, Pearlman WA (1996) A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans Circ Syst Video Technol 6(3):243–250
Seong TY, Kwon KC, Lee SH, Moon KS, Kwon KR (2014) DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol. J K Multimed Soc 17(12):1402–1411
Somaraj S, Hussain MA (2015) Performance and Security Analysis for image encryption using Key image. Indian J Sci Technol 8(35)
Sridokmai T, Prakancharoen S (2015). The homomorphic other property of Paillier cryptosystem. In Science and Technology (TICST), 2015 International Conference on (356–359). IEEE
Subramanyam AV, Emmanuel S (2012) Robust watermarking of compressed and encrypted JPEG2000 IMAGES. IEEE Trans Multimed 14(3):130–142
Tebaa, M., El Hajji, S., & El Ghazi, A. (2012). Homomorphic encryption applied to the cloud computing security. In Proceedings of the World Congress on Engineering (Vol. 1, pp. 4-6).
Walker JS, Nguyen TO (2000) Adaptive Scanning Methods for Wavelet Difference Reduction in Lossy Image Compression. Proc IEEE Int Conf Image Proc 3:182–185
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mishra, A., Gupta, R. & Jain, S. Secure and robust color image watermarking scheme using partial homomorphic cryptosystem in ASWDR compressed domain. Multimed Tools Appl 78, 22127–22154 (2019). https://doi.org/10.1007/s11042-019-7452-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-7452-4