Secure watermarking scheme against watermark attacks in the

  • Slides: 11
Download presentation
Secure watermarking scheme against watermark attacks in the encrypted domain Source: Journal of Visual

Secure watermarking scheme against watermark attacks in the encrypted domain Source: Journal of Visual Communication and Image Representation, Vol. 30, pp. 125 -135, 2015. Authors: Jianting Guo, Peijia Zheng and Jiwu Huang. Speaker: Chin Hao Chuan Date: 03/09 1

Outline • Related Work • Paillier homomorphic encryption • Proposed Scheme • Experimental Results

Outline • Related Work • Paillier homomorphic encryption • Proposed Scheme • Experimental Results • Conclusions 2

Related Work-PHE 3

Related Work-PHE 3

Proposed Scheme DWT LL LH HL HH 4

Proposed Scheme DWT LL LH HL HH 4

Proposed Scheme 1 428 425 409 438 412 428 400 425 2 432 429

Proposed Scheme 1 428 425 409 438 412 428 400 425 2 432 429 414 428 411 433 404 432 1 403 408 438 415 430 407 404 432 2 404 438 421 411 401 427 436 433 1 432 412 405 431 402 404 437 409 2 432 419 413 405 400 413 425 426 1 429 416 407 428 438 415 426 416 2 433 402 436 413 420 432 409 LL 428 403 432 429 1681 4 9 8 425 408 412 416 -6 -8 7 11 409 438 405 407 21 -11 12 24 438 415 431 428 -3 1 -15 -16 432 404 432 433 1683 7 11 1 429 438 419 402 15 -3 -4 13 414 421 413 436 -4 -4 16 17 428 411 405 413 5 -28 14 1 DCT 428 403 432 429 425 408 412 416 409 438 405 407 438 415 431 428 432 404 432 433 429 438 419 402 414 421 413 436 428 411 405 413 5

Proposed Scheme 1681 4 9 8 -6 -8 7 11 21 -11 12 24

Proposed Scheme 1681 4 9 8 -6 -8 7 11 21 -11 12 24 -3 1 -15 -16 1683 7 11 1 15 -3 -4 13 -4 -4 16 17 5 -28 14 1 1683 7 11 1 15 -3 9 13 -4 -4 16 17 -5 -28 14 1 1 0 0 1 1 0 436 399 427 437 0 0 1 1 433 438 419 406 1 0 411 421 413 432 424 416 410 6

Proposed Scheme-extraction 428 403 432 429 1681 4 9 8 425 408 412 416

Proposed Scheme-extraction 428 403 432 429 1681 4 9 8 425 408 412 416 -6 -8 7 11 409 438 405 407 21 -11 12 24 438 415 431 428 -3 1 -15 -16 436 399 427 437 1683 7 11 1 433 438 419 406 15 -3 9 13 411 421 413 432 -4 -4 16 17 424 416 410 -5 -28 14 1 DCT 0 1 7

Experimental Results (a) noise attack; (b) cropping attack; 8

Experimental Results (a) noise attack; (b) cropping attack; 8

Experimental Results (c) BDCTlm; (d) DCTlm; (e) DWTll; (f) JPEG-90; [11] T. Bianchi, A.

Experimental Results (c) BDCTlm; (d) DCTlm; (e) DWTll; (f) JPEG-90; [11] T. Bianchi, A. Piva, M. Barni, Encrypted domain DCT based on homomorphic 9

Experimental Results 10

Experimental Results 10

Conclusions • By combining the encrypted domain DWT and DCT, the performance of the

Conclusions • By combining the encrypted domain DWT and DCT, the performance of the watermarking scheme has been improved. • The visual quality and the robustness of the scheme are satisfactory. 11