|
1.IntroductionSeveral means have been proposed to protect media data, among which, media encryption1 and digital watermarking2 have been attracting more and more researchers. Media encryption encodes media data into an unintelligible form, which protects media data’s confidentiality. Digital watermarking embeds identification information into media data imperceptibly, which protects media data’s ownership. Because they realize different functionalities, the two means are often applied independently. To remain secure, they can be used together. For example, media data are first watermarked, and then encrypted. However, in this case, the encrypted media data should be decrypted before the watermark can be extracted or another watermark can be embedded. It is secure to commutate watermarking and encryption,3 although it is still difficult to find a practical solution. As a commutative watermarking and encryption process, the following condition is satisfied: Here, , , , , and denote the original media, cipher media, watermarked cipher media, watermarked media, and watermark, respectively; and , , , and denote the encryption function, watermark embedding function, encryption key, and decryption key, respectively. If the scheme is practical, more convenience will result for media distribution. However, until now, no solutions have been reported.In the past decade, some partial encryption algorithms have been reported that encrypt only some significant parts of the media data, such as the significant frequency bands, bit planes, and/or coding passes in JPEG2000 images,4, 5 the motion vectors or discrete cosine transform (DCT) coefficients in MPEG2 streams,6, 7 and the intraprediction modes and/or DCT coefficients in advanced video coding.8, 9 Similarly, media watermarking often embeds watermark information into parts of media data, such as the dc or ac’s in DCT blocks,10, 11 and the wavelet coefficients in middle frequency bands.12, 13 Considering that these operations are often applied to media data partially, it is possible to combine watermarking and encryption together. In the following, we present a commutative watermarking and encryption scheme that encrypts and marks media data partially or selectively. 2.Proposed Commutative SchemeThe proposed scheme is shown in Fig. 1. Here, , , , , , , and denote the original media, cipher media, watermarked cipher media, watermarked media, watermark, encryption key and decryption key, respectively; and , , , and denote the encryption function, decryption function, watermark embedding function, and watermark extraction function, respectively. The original media is partitioned into two parts: the significant part and the other part . Among them, will be encrypted, and will be watermarked. Thus, , , , and . The proposed commutative scheme is defined as follows. 3.Practical Scheme Based on Wavelet CodecBased on wavelet transformation, we propose the commutative scheme shown in Fig. 2. Here, the image is transformed by a four-level wavelet.
In our scheme, the selection of the wavelet coefficients in middle frequency depends on the requirements of security and robustness. Without considering sign encryption, the more the coefficients in the low-frequency band are encrypted, the more confused is the encrypted image. Figure 3 shows the relation between the encrypted frequency band and the quality of the encrypted image. The coefficients are encrypted with the Advanced Encryption Standard (AES) as proposed in Ref. 4. Similarly, the more watermarked coefficients are in the low-frequency bands, the more robust the watermark is to signal processing operations (compression, noise, filtering, etc.). Figure 4 gives the relation between the watermarked frequency band and the robustness to JPEG2000 compression. The QIM method15 is used as the watermark algorithm. To obtain a trade-off between the security and robustness, the coefficients in the highest level frequency bands ( , and ) should be encrypted, and the coefficients in the second highest level frequency bands ( , and ) can be watermarked. This method can be combined with JPEG2000; that is, the image can be compressed and encrypted/watermarked simultaneously. The watermark is embedded immediately after quantization, coefficient encryption, and sign encryption can be applied following the entropy encoding process. As an example, “Airplane” (colorful, ) is encrypted partially, then watermarked with QIM, finally decrypted and extracted. The results in Fig. 5 show that the scheme is commutative. 4.Conclusions and Future WorkWe proposed a commutative encryption and watermarking scheme that is based on partial encryption. Based on the scheme, a commutative image encryption and watermarking algorithm in wavelet codec was presented, and the trade-off between security and robustness was analyzed. The encryption/watermarking algorithm can be combined with JPEG2000 codec, which is time-efficient compared with the compression process. In future work, the commutative scheme’s security and robustness and its extension to other codecs will be further studied. AcknowledgmentsThe authors want to thank editors for their great help and reviewers for their valuable advice. ReferencesW. Zeng and
S. Lei,
“Efficient frequency domain selective scrambling of digital video,”
IEEE Trans. Multimedia, 5
(1), 118
–129
(2003). 1520-9210 Google Scholar
P. Moulin and
R. Koetter,
“Data-hiding codes,”
2083
–2127
(2005). Google Scholar
First summary report on hybrid systems,TR: IST-2002-507932 ECRYPT European Network of Excellence in Cryptology,”
(2005) http://www.ecrypt.eu.org/documents/D.WVL.5-1.0.pdf Google Scholar
S. Lian,
J. Sun,
D. Zhang, and
Z. Wang,
“A selective image encryption scheme based on JPEG2000 Codec,”
65
–72
(2004). Google Scholar
A. Pommer and
A. Uhl,
“Selective encryption of wavelet-packet encoded image data: efficiency and security,”
9
(3), 279
–287
(2003) Google Scholar
L. Tang,
“Methods for encrypting and decrypting MPEG video data efficiently,”
219
–230
(1996). Google Scholar
C. Shi and
B. Bhargava,
“A fast MPEG video encryption algorithm,”
81
–88
(1998). Google Scholar
J. Ahn,
H. Shim,
B. Jeon, and
I. Choi,
“Digital video scrambling method using intra prediction mode,”
386
–393
(2004). Google Scholar
S. Lian,
Z. Liu,
Z. Ren, and
Z. Wang,
“Selective video encryption based on advanced video coding,”
281
–290
(2005). Google Scholar
J. Huang,
Y. Q. Shi, and
Y. Shi,
“Embedding image watermarks in DC components,”
IEEE Trans. Circuits Syst. Video Technol., 10
(6), 974
–979
(2000). https://doi.org/10.1109/76.867936 1051-8215 Google Scholar
J. Hernández,
M. Amado, and
P. Perez-Gonzalez,
“DCT-domain watermarking techniques for still images: detector performance analysis and a new structure,”
IEEE Trans. Image Process., 9
(1), 55
–68
(2000). https://doi.org/10.1109/83.817598 1057-7149 Google Scholar
K. Maeno,
Q. Sun,
S.-F. Chang, and
M. Suto,
“New semi-fragile image authentication watermarking techniques using random bias and non-uniform quantization,”
Proc. SPIE, 4657 659
–670
(2002). 0277-786X Google Scholar
R. Dugad,
K. Ratakonda, and
N. Ahuja,
“A new wavelet-based scheme for watermarking images,”
(1998). Google Scholar
I. Cox,
T. Killian,
T. Leighton, and
T. Shamoon,
“Secure spread spectrum watermarking for multimedia,”
IEEE Trans. Image Process., 6
(12), 1673
–1687
(1997). https://doi.org/10.1109/83.650120 1057-7149 Google Scholar
B. Chen and
G. Wornell,
“Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,”
IEEE Trans. Inf. Theory, 47
(4), 1423
–1443
(2001). https://doi.org/10.1109/18.923725 0018-9448 Google Scholar
|