scispace - formally typeset
Journal ArticleDOI

Secure and robust color image watermarking scheme using partial homomorphic cryptosystem in ASWDR compressed domain

Reads0
Chats0
TLDR
The Paillier encryption is employed for watermarking of six different compressed images in ASWDR (Adaptively Scanned Wavelet Difference Reduction) domain and the results are found to be encouraging both in terms of visual quality and the correlation coefficient values.
Abstract
The primary requirement of Secure Signal Processing (SSP) is to protect the identity and content of the transmitted data. To this end, various encryption techniques are employed. Homomorphic encryption in general and Paillier cryptosystem in particular is found to be one such algorithm suitable for image processing applications. It offers additive privacy homomorphism. In this paper, the Paillier encryption is employed for watermarking of six different compressed images in ASWDR (Adaptively Scanned Wavelet Difference Reduction) domain. The results are found to be encouraging both in terms of visual quality and the correlation coefficient values. The proposed watermarking scheme ensures robustness towards selected image processing attacks. The encryption parameters like NPCR (Number of Pixels Change Rate), UACI (Unified Average Changing Intensity) and Encryption Speed are evaluated. The proposed technique is compared with the one in SPIHT (Set Partitioning in Hierarchical Trees) domain. The experimental results obtained for ASWDR compression are better placed in comparison to those obtained by SPIHT compression. The proposed scheme is further analyzed in view of other recent schemes carried out by using RSA as an encryption tool in DWT domain. It is concluded that our proposed scheme is better placed in comparison to this scheme.

read more

Citations
More filters
Journal ArticleDOI

A Comprehensive Survey on Secure Outsourced Computation and Its Applications

TL;DR: This survey provides a technical review and comparison of existing outsourcing schemes using diverse secure computation methods and introduces four secure techniques and their related works, focusing on the theories and evolution of homomorphic encryption.
Journal ArticleDOI

Data Hiding: Current Trends, Innovation and Potential Challenges

TL;DR: Data hiding approaches have received much attention in a number of application areas, however, those approaches unable to solve many issues that necessary to be measured in future investigations.
Journal ArticleDOI

Recent trends in image watermarking techniques for copyright protection: a survey

TL;DR: In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations.
Journal ArticleDOI

Encryption-Then-Compression-Based Copyright Protection Scheme for E-Governance

TL;DR: A joint encryption-then-compression-based watermarking scheme for copyright protection and content verification in variety of applications and performance outcomes confirm better robustness and security of the method while preserving the image quality.
References
More filters
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

A new, fast, and efficient image codec based on set partitioning in hierarchical trees

TL;DR: The image coding results, calculated from actual file sizes and images reconstructed by the decoding algorithm, are either comparable to or surpass previous results obtained through much more sophisticated and computationally complex methods.
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Related Papers (5)