Digital watermarking in the fractional Fourier transformation domain
Journal of Network and Computer Applications
Attack modelling: towards a second generation watermarking benchmark
Signal Processing - Special section on information theoretic aspects of digital watermarking
The Design of Rijndael
Tree-Structured Haar Transforms
Journal of Mathematical Imaging and Vision
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Zero-Knowledge Watermark Detection and Proof of Ownership
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Overview on selective encryption of image and video: challenges and perspectives
EURASIP Journal on Information Security
A cryptographic method for secure watermark detection
IH'06 Proceedings of the 8th international conference on Information hiding
Combining Tardos fingerprinting codes and fingercasting
IH'07 Proceedings of the 9th international conference on Information hiding
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Scalar Costa scheme for information embedding
IEEE Transactions on Signal Processing
An improved asymmetric watermarking scheme suitable for copy protection
IEEE Transactions on Signal Processing
IEEE Transactions on Information Theory
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
On the Design of Perceptual MPEG-Video Encryption Algorithms
IEEE Transactions on Circuits and Systems for Video Technology
Commutative Encryption and Watermarking in Video Compression
IEEE Transactions on Circuits and Systems for Video Technology
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Proceedings of the 20th ACM international conference on Multimedia
Reversible data hiding in encrypted images using pseudorandom sequence modulation
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
In this paper a commutative watermarking and ciphering scheme for digital images is presented. The commutative property of the proposed method allows to cipher a watermarked image without interfering with the embedded signal or to watermark an encrypted image still allowing a perfect deciphering. Both operations are performed on a parametric transform domain: the Tree Structured Haar transform. The key dependence of the adopted transform domain increases the security of the overall system. In fact, without the knowledge of the generating key it is not possible to extract any useful information from the ciphered-watermarked image. Experimental results show the effectiveness of the proposed scheme.