Skip to main content
Log in

Commutative encryption and watermarking based on orthogonal decomposition

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Commutative Encryption and Watermarking (CEW) is a technology combined with encryption and watermarking, which is used for providing comprehensive security protection for multimedia information. This paper presents a novel CEW scheme based on orthogonal decomposition. Different from current CEW, the proposed CEW not only achieves the integration of encryption and watermarking in the final data but also has no specific restrictions in selecting encryption and watermarking algorithms. Therefore, the proposed CEW possesses higher security and applicability. Experimental results demonstrate that the proposed CEW can keep the performances of selected encryption and watermarking algorithm and show more robustness than other current CEW schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. (2005) First summary report on hybrid systems. ECRYPT European Network of Excellence in Cryptology. Available: http://www.ecrypt.eu.org/documents/

  2. Battisti F, Cancellaro M, Carli M, Boato G, Neri A (2008) Watermarking and encryption of color images in the fibonacci domain. 2008 Proc. of SPIE, San Jose.

  3. Battisti F, Cancellaro M, Boato G, Carli M, Neri A (2009) Joint watermarking and encryption of color images in the fibonacci-haar domain. EURASIP J Adv Signal Process 2009:1–13

    Article  Google Scholar 

  4. Boato G, Conci N, Conotter V, Natale FGBD, Fontanari C (2008) Multimedia asymmetric watermarking and encryption. Electron Lett 44:601–603

    Article  Google Scholar 

  5. Cancellaro M, Battisti F, Carli M, Boato G, Natale FGBD, Neri A (2008) A joint digital watermarking and encryption method. In: 2008 Proc. of SPIE, San Jose: 68191

  6. Cancellaro M, Battisti F, Carli M, Boato G, Natale FGBD, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structured Haar transform domain. Signal Process Image Comm 26:1–12

    Article  Google Scholar 

  7. Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theor 47:1423–1443

    Article  MATH  MathSciNet  Google Scholar 

  8. Jiang L, Xu Z (2010) Combination algorithm of active and passive security protection for image based on arnold transform. Proc. of 2010 IEEE Int. Conf. Multimedia Information Networking and Security, Nanjing

  9. Lian S (2009) Quasi-commutative watermarking and encryption for secure media content distribution. Multimed Tool Appl 43:91–107

    Article  Google Scholar 

  10. Lian S, Liu Z, Ren Z, Wang H (2006) Commutative watermarking and encryption for media data. Optic Eng 45:080510

    Article  Google Scholar 

  11. Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. IEEE Trans Circuit Syst Video Tech 17:774–778

    Article  Google Scholar 

  12. Park S, Shin S (2008) Combined scheme of encryption and watermarking in H.264/scalable video coding (SVC). New Direct in Intel Interac Multimedia 142:351–361

    Article  Google Scholar 

  13. Steinebach M, Zmudzinski S, Bolke T (2005) Audio watermarking and partial encryption. In: 2005 Proc. of SPIE, San Jose: 779–788

  14. Sun J, Xu Z, Liu J, Yao Y (2011) An objective visual security assessment for cipher-images based on local entropy. Multimed Tool Appl 53:75–95

    Article  Google Scholar 

  15. Walsh JL (1923) A closed set of normal orthogonal functions. Am J Math 45:5–24

    Article  MATH  Google Scholar 

Download references

Acknowledgment

This work was supported by the National Basic Research Program of China (973 Program) under Grant 2011CB302204, the National Natural Science Foundation of China under Grant 41101416, the Research Fund for the Doctoral Program of Higher Education of China under Grant 20110141110056 and the Doctoral Candidate Research Independent Fund of Wuhan University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhengquan Xu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jiang, L., Xu, Z. & Xu, Y. Commutative encryption and watermarking based on orthogonal decomposition. Multimed Tools Appl 70, 1617–1635 (2014). https://doi.org/10.1007/s11042-012-1181-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1181-2

Keywords

Navigation