2021
DOI: 10.3390/s21030701
|View full text |Cite
|
Sign up to set email alerts
|

Joint Image Encryption and Screen-Cam Robust Two Watermarking Scheme

Abstract: This paper proposes a joint encryption and screen-cam robust watermarking scheme. This method combines the advantages of smartphone, encryption and watermarking technologies, thereby achieving watermark extraction with a smartphone, partial decryption and tracking leakage from sneak shots. We design a dual watermarking algorithm to achieve watermark detection from both encrypted and decrypted images. First, a watermark is embedded in the discrete Fourier transform (DFT) domain to enable leakage tracking. Then,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 73 publications
0
6
0
Order By: Relevance
“…However, the testing results did not demonstrate resistance to projective distortions. Chen et al [7,31] proposed a watermarking method for screen-cam systems, where a camera device is used to generate content displayed on screens into digital signals. The method is based on using DFT to fix the synchronization problems.…”
Section: Related Workmentioning
confidence: 99%
“…However, the testing results did not demonstrate resistance to projective distortions. Chen et al [7,31] proposed a watermarking method for screen-cam systems, where a camera device is used to generate content displayed on screens into digital signals. The method is based on using DFT to fix the synchronization problems.…”
Section: Related Workmentioning
confidence: 99%
“…The watermarking method is known for its capability in retrieving the actual information without losing the significant data in it [6], [7]. The encrypted secret data is sent via internet or wireless networks to fulfill the need of securing the route of data transmission over distinct communication channels [8], [9]. Moreover, encryption of secret information prevents unapproved access, data destruction, and adjustment of data in data exchange [10], [11].…”
Section: Introductionmentioning
confidence: 99%
“…The principle issues to be addressed are the distribution, tampering, and illegal copying of unprotected material, which may result in the lack of accountability for the perpetrators 4 or the misleading of justice 5 . To address these issues, digital watermarking has appeared as an alternative solution to encryption 6‐10 . In fact, encryption fails to protect contents in a hostile environment, whereas once they are decrypted by a malicious person the original issues will rise again.…”
Section: Introductionmentioning
confidence: 99%
“…5 To address these issues, digital watermarking has appeared as an alternative solution to encryption. [6][7][8][9][10] In fact, encryption fails to protect contents in a hostile environment, whereas once they are decrypted by a malicious person the original issues will rise again. However, watermarking shields media (i.e., image, audio, or video) by embedding, generally, a non-removable watermark serving to protect the media or trace back the leaker.…”
Section: Introductionmentioning
confidence: 99%