Presentation is loading. Please wait.

Presentation is loading. Please wait.

Source: Journal of Visual Communication and Image Representation, Vol

Similar presentations


Presentation on theme: "Source: Journal of Visual Communication and Image Representation, Vol"ā€” Presentation transcript:

1 Secure watermarking scheme against watermark attacks in the encrypted domain
Source: Journal of Visual Communication and Image Representation, Vol.30, pp ,2015. Authors: Jianting Guo, Peijia Zheng and Jiwu Huang. Speaker: Chin Hao Chuan Date: 03/09

2 Outline Related Work Proposed Scheme Experimental Results Conclusions
Paillier homomorphic encryption Proposed Scheme Experimental Results Conclusions

3 Related Work-PHE p,q N=pāˆ—q Ī³=š‘™š‘š‘š š‘āˆ’1,š‘žāˆ’1 Public key :(N, g) š‘”
š‘™š‘š‘š : Least common multiple p,q N=pāˆ—q Ī³=š‘™š‘š‘š š‘āˆ’1,š‘žāˆ’1 Public key :(N, g) š‘” gcd L š‘” š›¾ š‘šš‘œš‘‘ š‘ 2 ,š‘ =1 šæ š‘„ = š‘„āˆ’1 š‘ Private key:(p, q,Ī³) š‘š= šæ( š‘ š›¾ š‘šš‘œš‘‘ š‘ 2 ) šæ( š‘” š›¾ š‘šš‘œš‘‘ š‘ 2 )

4 Proposed Scheme LL LH HL HH DWT

5 Proposed Scheme šµ 1 LL šµ 2 DCT šµ 1 š‘‡ 1 šµ 2 š‘‡ 2 428 403 432 429 425 408
412 416 409 438 405 407 415 431 1 2 1 2 1 2 1 2 428 432 403 404 429 433 425 408 438 412 419 416 402 409 414 421 405 413 407 436 415 411 431 430 401 400 420 427 437 426 šµ 1 432 404 433 429 438 419 402 414 421 413 436 428 411 405 LL šµ 2 428 403 432 429 425 408 412 416 409 438 405 407 415 431 1681 4 9 8 -6 -8 7 11 21 -11 12 24 -3 1 -15 -16 DCT šµ 1 š‘‡ 1 432 404 433 429 438 419 402 414 421 413 436 428 411 405 1683 7 11 1 15 -3 -4 13 16 17 5 -28 14 šµ 2 š‘‡ 2

6 Proposed Scheme š¾š‘’š‘¦ 2 :0101 š‘‹ 2 = š‘‹ 1 +2 š‘–š‘“ š‘¤ š‘– =1 š‘‹ 1 āˆ’2 š‘–š‘“ š‘¤ š‘– =0
1681 4 9 8 -6 -8 7 11 21 -11 12 24 -3 1 -15 -16 š‘‹ 2 = š‘‹ š‘–š‘“ š‘¤ š‘– =1 š‘‹ 1 āˆ’2 š‘–š‘“ š‘¤ š‘– =0 š‘‡ 1 š‘‹ā€² 2 =7+2=9 1683 7 11 1 15 -3 -4 13 16 17 5 -28 14 š‘‹ā€² 2 =āˆ’3āˆ’2=āˆ’5 1683 7 11 1 15 -3 9 13 -4 16 17 -5 -28 14 š‘‡ 2 1 š¾š‘’š‘¦ 1 436 399 427 437 433 438 419 406 411 421 413 432 424 416 410 š‘Š

7 Proposed Scheme-extraction
428 403 432 429 425 408 412 416 409 438 405 407 415 431 1681 4 9 8 -6 -8 7 11 21 -11 12 24 -3 1 -15 -16 DCT šµā€² 1 š‘‡ā€² 1 436 399 427 437 433 438 419 406 411 421 413 432 424 416 410 1683 7 11 1 15 -3 9 13 -4 16 17 -5 -28 14 šµā€² 2 š‘‡ā€² 2 š‘‹ā€² 2 āˆ’ š‘‹ ā€² 1 >0 ā‡’ š‘¤ š‘– =1 š‘‹ā€² 2 āˆ’ š‘‹ ā€² 1 <0 ā‡’ š‘¤ š‘– =0 1 š¾š‘’š‘¦ 2 :0101 9āˆ’7=2>0 āˆ’5āˆ’ āˆ’3 =āˆ’2<0 š‘Š

8 Experimental Results (a) noise attack; (b) cropping attack;

9 Experimental Results (c) BDCTlm; (d) DCTlm; (e) DWTll; (f) JPEG-90;
[11] T. Bianchi, A. Piva, M. Barni, Encrypted domain DCT based on homomorphic cryptosystems, EURASIP J. Inform. Secur. (2009).

10 Experimental Results

11 Conclusions By combining the encrypted domain DWT and DCT, the performance of the watermarking scheme has been improved. The visual quality and the robustness of the scheme are satisfactory.


Download ppt "Source: Journal of Visual Communication and Image Representation, Vol"

Similar presentations


Ads by Google