Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Security Enhancement for Color Images via Invisible Watermarking and Reversible Data Hiding in Encrypted Domain

Ing. Daniel García Olivares

Dr. Manuel Cedillo Hernández

Security Enhancement for Color Images via Invisible Watermarking and Reversible Data Hiding in Encrypted Domain

OUTLINE

Introduction

Proposed method

Outline

Experimental results

Conclusions

Intro

Introduction

  • Our propose: A security enhancement method for color images, based on a hybrid scheme: Watermarking, Reversible data hiding (RDH) and encryption techniques, respectively
  • Justification:
  • To ensure the ownership image authentication.
  • To Increase the security of the information.
  • Goals: To guarantee the imperceptibility, embedding capacity, robustness and security, in the context of watermarking and RDH

Intro

Encryption

Reversible Data Hiding

Encryption techniques are effective and popular means of privacy protection

Allows to recover the original digital medium, error-free

RDH schemes in combination with cipher techniques have gained increasing attention.

RDH techniques are suitable for other data hiding methods

To ensure the information security by encrypt it just before transmitting the information.

Guarantee the additional bits imperceptibility when they are already hidden.

Brings the possibility to recover or at least to get an approximation of the original digital content

Digital watermarking

Is a solution for ownership authentication

Invisible techniques are mainly based on the transform domain, hence robustness is guarantied.

May be an invisible or visible technique

Intro

What if...?

Encryption methods

Watermarking techniques

Reversible data hiding

Proposed method

Content owner: Has the original digital image to encrypt it.

Proposed method

Data hider: Has the secret information to embed it into the ciphered image,then the whole content is encrypted again.

Receiver: Has the ciphered image with hidden data to recover it error-free or just extract the hidden data or both.

Diagram

General diagram

The luminance Y and chroma components Cb, Cr are encrypted by chaotic mixture procedure

Experimental results

Consider imperceptibility and robustness properties for invisible watermarking stage

Experimental results

Capacity and imperceptibility are two parameters to consider in RDH issue

In the encryption context we have only considered its security in a variety of color images

Experimental Results

RDH embedding capacity

RDH imperceptibility

TABLE II

IMPERCEPTIBILITY OF THE REVERSIBLE DATA HIDING

RDH imperceptibility vs embedding capacity

Imperceptibility of reversible data hiding algorithm with variable capacity

Experimental Results

Watermark imperceptibility

watermark strength factor from 1 to 10 and watermark pattern W with LN=64

Watermark imperceptibility

watermark strength factor =1.5 and a variable watermark length LN from 16 to 96 bits

Watermark robustness

Considering watermark W with LN=64, “Lena” test image and several distortions composed by common signal processing, geometric and combined attacks, the bit error rate between original and recovered watermark patterns was obtained

Experimental results

Encryption algorithms security: chaotic mixing technique

An example of decrypted image when secret keys k and P, are erroneous separately (c)-(d) and concurrently (e) respectively, as well as when both are correct (f)

Encryption algorithms security: Lightweight encryption algorithm SIT

(a) Original image. (b) Encrypted by SIT algorithm, (c) Decrypted with erroneous key. (d) Decrypted with correct key

Conclusions

From the viewpoint of reversible data hiding, the method has a low-moderate capacity and recovers the original information (chrominance and secret message) with error-free

Conclusions

From the viewpoint of invisible watermarking, the proposed method shows high robustness against several geometric, common signal processing operations and combined distortions; as well as high imperceptibility

References

References

[1] Y.Q. Shi, X. Li, X. Zhang, H.T. Wu and B. Ma, “Reversible data hiding: Advances in the past two decades” in IEEE Access, vol. 4, pp. 3210-3237, 2016.

[2] R. Caldelli, F. Filippini, and R. Becarelli, "Reversible watermarking techniques: An overview and a classification," EURASIP J. Inf. Secur., vol. 2010, 2010, Art. no. 134546.

[3] K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, "Reversible data hiding in encrypted images by reserving room before encryption," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553-562, Mar. 2013.

[4] C.-W. Shiu, Y.-C. Chen, and W. Hong, "Encrypted image-based reversible data hiding with public key cryptography from difference expansion," Signal Process., Image Commun., vol. 39, pp. 226-233, Nov. 2015.

[5] X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.

[6] J. Zhou, W. Sun, L. Dong, X. Liu, O. C. Au, and Y. Y. Tang, "Secure reversible image data hiding over encrypted domain via key modulation," IEEE Trans. Circuits Syst. Video Technol., vol. 26, no. 3, pp. 441-452, Mar. 2016.

[7] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography. San Mateo, CA, USA: Morgan Kaufmann, 2007.

[8] M. Barni, F. Bartolini, Applications. In: “Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications,” Marcel Dekker Inc., New York, pp. 23-44, 2004.

[9] M. Cedillo-Hernandez, A. Cedillo-Hernandez, F. Garcia-Ugalde, M. Nakano-Miyatake, H. Perez-Meana, "Digital Color Images Ownership Authentication via Efficient and Robust Watermarking in a Hybrid Domain," Radioengineering Journal. 26(2), pp. 536-551, 2017.

Learn more about creating dynamic, engaging presentations with Prezi