2013 IEEE International Symposium on Multimedia 2013
DOI: 10.1109/ism.2013.54
|View full text |Cite
|
Sign up to set email alerts
|

Towards More Robust Commutative Watermarking-Encryption of Images

Abstract: Abstract-Histogram-based watermarking schemes are invariant against pixel permutations and can be combined with permutation-based ciphers. However, typical histogram-based watermarking schemes based on comparison of histogram bins are prone to de-synchronization attacks, where the whole histogram is shifted by a certain amount. In this paper we investigate the possibility of avoiding this kind of attacks by synchronizing the embedding and detection processes, using the mean of the histogram as a calibration po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…The basic watermarking process closely follows the approach taken in [8] and [7] and is based on the idea of swapping histogram bins according to a secret watermarking key W K [3]: For each watermark bit w i ∈ {−1, 1}, the algorithm randomly selects a certain histogram bin a i and another bin b i within a dneighbourhood of a i , taking W K as initial seed. Here, d is a fixed parameter governing the tradeoff between robustness and transparency of the watermark.…”
Section: Watermarking Processmentioning
confidence: 99%
See 2 more Smart Citations
“…The basic watermarking process closely follows the approach taken in [8] and [7] and is based on the idea of swapping histogram bins according to a secret watermarking key W K [3]: For each watermark bit w i ∈ {−1, 1}, the algorithm randomly selects a certain histogram bin a i and another bin b i within a dneighbourhood of a i , taking W K as initial seed. Here, d is a fixed parameter governing the tradeoff between robustness and transparency of the watermark.…”
Section: Watermarking Processmentioning
confidence: 99%
“…An image is deemed unauthentic, if the linear correlation is below a certain threshold T . Assuming a balanced distribution of the bipolar bits in w(I, c), the corresponding False Positive probability is [7]:…”
Section: Watermarking Processmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared with the encryption technique, the watermarking technique embeds the invisible information into the data, which can be extracted and used to authenticate data's ownership or identification, but it cannot ensure the security in data transmission [11]- [18]. Therefore, it is possible to overcome the limitation of a single technique by combining both the techniques of encryption and watermarking together to protect both confidentiality and ownership/ identification [19]- [21].…”
Section: Introductionmentioning
confidence: 99%
“…To overcome this problem, in the present paper, we further improve our earlier work described in (Schmitz et al, 2012) by deploying a synchronization process between embedder and detector that is based on the global mean of the histogram. A preliminary edition of the present paper was presented at the 2013 IEEE International Symposium on Multimedia (ISM), see (Schmitz et al, 2013).…”
Section: Introductionmentioning
confidence: 99%