Abstract
Commutative Encryption and Watermarking (CEW) is a technology combined with encryption and watermarking, which is used for providing comprehensive security protection for multimedia information. This paper presents a novel CEW scheme based on orthogonal decomposition. Different from current CEW, the proposed CEW not only achieves the integration of encryption and watermarking in the final data but also has no specific restrictions in selecting encryption and watermarking algorithms. Therefore, the proposed CEW possesses higher security and applicability. Experimental results demonstrate that the proposed CEW can keep the performances of selected encryption and watermarking algorithm and show more robustness than other current CEW schemes.
Similar content being viewed by others
References
(2005) First summary report on hybrid systems. ECRYPT European Network of Excellence in Cryptology. Available: http://www.ecrypt.eu.org/documents/
Battisti F, Cancellaro M, Carli M, Boato G, Neri A (2008) Watermarking and encryption of color images in the fibonacci domain. 2008 Proc. of SPIE, San Jose.
Battisti F, Cancellaro M, Boato G, Carli M, Neri A (2009) Joint watermarking and encryption of color images in the fibonacci-haar domain. EURASIP J Adv Signal Process 2009:1–13
Boato G, Conci N, Conotter V, Natale FGBD, Fontanari C (2008) Multimedia asymmetric watermarking and encryption. Electron Lett 44:601–603
Cancellaro M, Battisti F, Carli M, Boato G, Natale FGBD, Neri A (2008) A joint digital watermarking and encryption method. In: 2008 Proc. of SPIE, San Jose: 68191
Cancellaro M, Battisti F, Carli M, Boato G, Natale FGBD, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structured Haar transform domain. Signal Process Image Comm 26:1–12
Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theor 47:1423–1443
Jiang L, Xu Z (2010) Combination algorithm of active and passive security protection for image based on arnold transform. Proc. of 2010 IEEE Int. Conf. Multimedia Information Networking and Security, Nanjing
Lian S (2009) Quasi-commutative watermarking and encryption for secure media content distribution. Multimed Tool Appl 43:91–107
Lian S, Liu Z, Ren Z, Wang H (2006) Commutative watermarking and encryption for media data. Optic Eng 45:080510
Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. IEEE Trans Circuit Syst Video Tech 17:774–778
Park S, Shin S (2008) Combined scheme of encryption and watermarking in H.264/scalable video coding (SVC). New Direct in Intel Interac Multimedia 142:351–361
Steinebach M, Zmudzinski S, Bolke T (2005) Audio watermarking and partial encryption. In: 2005 Proc. of SPIE, San Jose: 779–788
Sun J, Xu Z, Liu J, Yao Y (2011) An objective visual security assessment for cipher-images based on local entropy. Multimed Tool Appl 53:75–95
Walsh JL (1923) A closed set of normal orthogonal functions. Am J Math 45:5–24
Acknowledgment
This work was supported by the National Basic Research Program of China (973 Program) under Grant 2011CB302204, the National Natural Science Foundation of China under Grant 41101416, the Research Fund for the Doctoral Program of Higher Education of China under Grant 20110141110056 and the Doctoral Candidate Research Independent Fund of Wuhan University.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jiang, L., Xu, Z. & Xu, Y. Commutative encryption and watermarking based on orthogonal decomposition. Multimed Tools Appl 70, 1617–1635 (2014). https://doi.org/10.1007/s11042-012-1181-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-012-1181-2