Abstract
With the increasing demands of privacy protection and integrity protection of digital images, attention has been drawn to the commutativity of watermarking and encryption. In some of the existing works, watermarking and image encryption are commutative, but watermark detection and image decryption are not commutative. Meanwhile, in some other schemes, watermark detection and image decryption are commutative, but the order of watermarking and image encryption is fixed. The existing schemes cannot meet the requirement of commutativity. Therefore, we propose a novel commutative zero-watermarking and encryption scheme, in which the commutativity is equipped in both the phases of watermarking and image encryption and the phases of watermark detection and image decryption. The proposed scheme is fragile, and the zero-watermarking will not cause any modification of the image. Experiments show that the proposed scheme is effective and feasible. The illegal tampered area of the zero-watermarked image can be accurately detected and located.
Similar content being viewed by others
References
Bravo-Solorio S, Calderon F, Li CT, Nandi AK (2018) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digital Signal Processing 73:83–92
Cancellaro M, Battisti F, Carli M, Boato G, De Natale FGB, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structuredHaar transform domain. Signal Process Image Commun 26(1):1–12
Fan M, Wang H (2018) An enhanced fragile watermarking scheme to digital image protection and self-recovery. Signal Process Image Commun 66:19–29
Hua Z, Zhou Y, Pun CM, Chen P (2015) 2D Sine Logistic modulation map for image encryption. Inf Sci 297:80–94
Jiang L, Xu Z, Xu Y (2014) Commutative encryption and watermarking based on orthogonal decomposition. Multimed Tools Appl 70(3):1617–1635
Khan A, Husain SA (2013) A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Sci World J 2013:796726
Lian S (2009) Quasi-commutative watermarking and encryption for secure media content distribution. Multimed Tools Appl 43(1):91–107
Liu S, Hennelly BM, Guo C, Sheridan JT (2015) Robustness of double random phase encoding spread-space spread-spectrum watermarking technique. Signal Process 109(43):345–361
Liu Y, Tian S, Hu W, Xing C (2012) Design and statistical analysis of a new chaotic block cipher for wireless sensor networks. Commun Nonlinear Sci Numer Simul 17(8):3267–3278
Liu X, Zhao R, Li F, Liao S, Ding Y, Zou B (2017) Novel robust zero-watermarking scheme for digital rights management of 3D videos. Signal Process Image Commun 54:140–151
Liu Y, Zhu Y, Xin G (2015) A zero-watermarking algorithm based on merging features of sentences for chinese text. J Chin Inst Eng 38(3):391–398
Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. IEEE Transactions on Information Forensics and Security 8(3):553–562
Mondal B, Kumar P, Singh S (2018) A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimed Tools Appl 77(23):31177–31198
Nazari M, Sharif A, Mollaeefar M (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl 76(15):16107–16123
Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293
Savelonas MA, Chountasis S (2010) Noise-resistant watermarking in the fractional fourier domain utilizing moment-based image representation. Signal Process 90(8):2521–2528
Simitopoulos D, Zissis N, Georgiadis P, Emmanouilidis V, Strintzis MG (2003) Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. Multimedia Systems 9(3):217–227
Subramanyam A, Emmanuel S, Kankanhalli MS (2012) Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Transactions on Multimedia 14(3):703–716
Tang X, Ma Z, Niu X, Yang Y (2015) Compressive sensing-based audio semi-fragile zero-watermarking algorithm. Chin J Electron 24(3):492–497
Thanh TM, Tanaka K (2017) An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information. Multimed Tools Appl 76(11):13455–13471
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18
Wang CP, Wang XY, Chen XJ, Zhang C (2017) Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping. Multimed Tools Appl 76(24):26355–26376
Wang C, Wang X, Xia Z, Zhang C (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109–120
Xiang L, Li Y, Hao W, Yang P, Shen X (2018) Reversible natural language watermarking using synonym substitution and arithmetic coding. Computers, Materials and Continua (CMC) 55(3):541–559
Yang C, Luo X, Lu J, Liu F (2018) Extracting hidden messages of MLSB steganography based on optimal stego subset. Science China Inf Sci 61(11):119103
Yu Y, Lei M, Liu X, Qu Z, Wang C (2016) Novel zero-watermarking scheme based on DWT-DCT. China Communications 13(7):122–126
Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security 7(2):826–832
Zhang X (2013) Commutative reversible data hiding and encryption. Security and Communication Networks 6(11):1396–1403
Acknowledgements
The work was funded by the National Natural Science Foundation of China (Grant Nos. 61602158, 61572089, 61502399, 61772176), the Natural Science Foundation of Chongqing Science and Technology Commission (Grant No. cstc2017jcyjBX0008), the Guangxi Key Laboratory of Trusted Software, the Science and Technology Research Project of Henan Province (182102210374), the Science Foundation for the Excellent Youth Scholars of Henan Normal University (YQ201607) and the Chongqing Postgraduate Education Reform Project (Grant No. yjg183018).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, M., Xiao, D., Zhu, Y. et al. Commutative fragile zero-watermarking and encryption for image integrity protection. Multimed Tools Appl 78, 22727–22742 (2019). https://doi.org/10.1007/s11042-019-7560-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-7560-1