10 research outputs found
A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem
We propose a new encryption scheme that supports joint fingerprinting and decryption. The scheme is remarkably resistant to known-plaintext attack and collusion attack (e.g. average attack or other linear combination attack) on keys. Interestingly, the security of our scheme is relied on a lattice problem: Given a collection of random lattice points generated from a short basis of a lattice, find the short basis. The scheme can be used as a traitor-tracing scheme or a buyer-seller watermarking scheme
Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes
Selective encryption masks all of the content without completely hiding it, as full encryption would do at a cost in encryption delay and increased bandwidth. Many commercial applications of video encryption do not even require selective encryption, because greater utility can be gained from transparent encryption, i.e. allowing prospective viewers to glimpse a reduced quality version of the content as a taster. Our lightweight selective encryption scheme when applied to scalable video coding is well suited to transparent encryption. The paper illustrates the gains in reducing delay and increased distortion arising from a transparent encryption that leaves reduced quality base layer in the clear. Reduced encryption of B-frames is a further step beyond transparent encryption in which the computational overhead reduction is traded against content security and limited distortion. This spectrum of video encryption possibilities is analyzed in this paper, though all of the schemes maintain decoder compatibility and add no bitrate overhead as a result of jointly encoding and encrypting the input video by virtue of carefully selecting the entropy coding parameters that are encrypted. The schemes are suitable both for H.264 and HEVC codecs, though demonstrated in the paper for H.264. Selected Content Adaptive Binary Arithmetic Coding (CABAC) parameters are encrypted by a lightweight Exclusive OR technique, which is chosen for practicality
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images, Journal of Telecommunications and Information Technology, 2014, nr 2
In this paper a new idea of digital images fi ngerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for graytone images but can easily be adopted for color ones. For the encryption purpose, the algorithm uses the rotation of data vectors presented as quaternions in a three-dimensional space around another quaternion (key). On the receiver's side, a small amount of unnoticeable by human eye errors occurs in the decrypted images. These errors are used as a user's digital ngerprint for the purpose of traitor tracing in case of copyright violation. A computer-based simulation was performed to scrutinize the potential presented quaternion encryption scheme for the implementation of digital ngerprinting. The obtained results are shown at the end of this paper
Secure and robust digital image watermarking scheme using logistic and RSA encryption
In the era of big data and networking, it is necessary to develop a secure and robust digital watermarking scheme with high computational efficiency to protect copyrights of digital works. However, most of the existing methods focus on robustness and embedding capacity, losing sight of security or requiring significant computational resources in the encryption process. This paper proposed a new digital image watermarking model based on scrambling algorithm Logistic and RSA asymmetric encryption algorithm to guarantee the security of the hidden data at the foundation of large embedding capacity, good robustness and high computational efficiency. The experiments involved applying the encryption algorithms of Logistic and RSA to the watermark image and performing the hybrid decomposition of Discrete wavelet transform (DWT) and Singular Value Decomposition (SVD) on the host image, and the watermark was embedded into the low-frequency sub-band of the host. The values of PSNR and NCC were measured to estimate the imperceptibility and robustness of the proposed watermarking scheme, and the CPU running time was recorded to measure the complexity of the proposed main algorithm in execution time. Experimental results showed the superiority of the proposed watermarking scheme
Comparative evaluation of video watermarking techniques in the uncompressed domain
Thesis (MScEng)--Stellenbosch University, 2012.ENGLISH ABSTRACT: Electronic watermarking is a method whereby information can be imperceptibly
embedded into electronic media, while ideally being robust against common signal
manipulations and intentional attacks to remove the embedded watermark. This
study evaluates the characteristics of uncompressed video watermarking techniques
in terms of visual characteristics, computational complexity and robustness against
attacks and signal manipulations.
The foundations of video watermarking are reviewed, followed by a survey of
existing video watermarking techniques. Representative techniques from different
watermarking categories are identified, implemented and evaluated.
Existing image quality metrics are reviewed and extended to improve their performance
when comparing these video watermarking techniques. A new metric for
the evaluation of inter frame flicker in video sequences is then developed.
A technique for possibly improving the robustness of the implemented discrete
Fourier transform technique against rotation is then proposed. It is also shown that
it is possible to reduce the computational complexity of watermarking techniques
without affecting the quality of the original content, through a modified watermark
embedding method.
Possible future studies are then recommended with regards to further improving
watermarking techniques against rotation.AFRIKAANSE OPSOMMING: ’n Elektroniese watermerk is ’n metode waardeur inligting onmerkbaar in elektroniese
media vasgelê kan word, met die doel dat dit bestand is teen algemene manipulasies
en doelbewuste pogings om die watermerk te verwyder. In hierdie navorsing
word die eienskappe van onsaamgeperste video watermerktegnieke ondersoek
in terme van visuele eienskappe, berekeningskompleksiteit en weerstandigheid teen
aanslae en seinmanipulasies.
Die onderbou van video watermerktegnieke word bestudeer, gevolg deur ’n oorsig
van reedsbestaande watermerktegnieke. Verteenwoordigende tegnieke vanuit verskillende
watermerkkategorieë word geïdentifiseer, geïmplementeer en geëvalueer.
Bestaande metodes vir die evaluering van beeldkwaliteite word bestudeer en uitgebrei
om die werkverrigting van die tegnieke te verbeter, spesifiek vir die vergelyking
van watermerktegnieke. ’n Nuwe stelsel vir die evaluering van tussenraampie flikkering
in video’s word ook ontwikkel.
’n Tegniek vir die moontlike verbetering van die geïmplementeerde diskrete Fourier
transform tegniek word voorgestel om die tegniek se bestandheid teen rotasie
te verbeter. Daar word ook aangetoon dat dit moontlik is om die berekeningskompleksiteit
van watermerktegnieke te verminder, sonder om die kwaliteit van die
oorspronklike inhoud te beïnvloed, deur die gebruik van ’n verbeterde watermerkvasleggingsmetode.
Laastens word aanbevelings vir verdere navorsing aangaande die verbetering van
watermerktegnieke teen rotasie gemaak
Video fingerprinting and encryption principles for digital rights management
This paper provides a tutorial and survey of digital fingerprinting and video scrambling algorithms based on partial encryption. Necessary design tradeoffs for algorithm development are highlighted for multicast communication environments. We also propose a novel architecture for joint fingerprinting and decryption that holds promise for a better compromise between practicality and security for emerging digital rights management applications. Keywords—Digital fingerprinting tutorial, digital video encryption survey, joint fingerprinting and decryption (JFD), video scrambling. I