SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 9 No.26 (2014) pp. 9323-9326
© Research India Publications; http://www.ripublication.com/ijaer.htm
Comparative Study of Watermarking and Encryption
Schemes for JPEG2000 Images
.J.Jereesha Mary, 2
S.Sebastin Antony Joe,
3
Dr.C.Seldev Christopher
Abstract: The need for secured digital data is getting more intense
and hence there is a necessity for ownership verification, tamper
proof and data integrity. As a solution for these, digital
watermarking methods may be used. In this paper, three
watermarking schemes namely Spread Spectrum (SS), Scalar
Costa scheme Quantization Index Modulation (SCS_QIM),
Rational Dither Modulation (RDM) and the encryption techniques
like RC4,RC5,RC6 which are responsible for the robustness of the
above said watermarking system for JPEG2000 images are
compared. The Peak Signal to Noise Ratio (PSNR) and the Mean
Square Error (MSE) for different watermark images have been
compared and presented in this paper.
Keywords – RC4, RC5, RC6, Spread Spectrum, Scalar Costa Scheme
Quantization Index modulation, Rational Dither
Modulation,JPEG2000.
INTRODUCTION
Digital media communication and security for the digital
content has seen a rapid growth in the current era. Digital Asser
Management Systems (DAMS) are intended to work with
compressed and encrypted data. Media contents liketext, image,
audio, video, etc., can be secured using digital watermark
techniques. Watermarking is a method that is used for reducing
counterfeiting in which the watermark is embedded inside the
message. This watermark can then be extracted or detected for
variety of purposes. Image authentication with watermarking
schemes was proposed by many researches in order to overcome
the drawbacks of image authentication using digital signature
schemes. In the latter scheme the modification of image or
tampering can be identified,but the exact location of
modification cannot be found [1-4]. Fridrich [5] proposed a
block cipher method to prevent collage attack and Wong [6]
proposed a public key fragile watermarking scheme for image
authentication which was vulnerable to vector quantization
attack. This was proven by Memon[7] and hence
WongandMemon[8] proposed an improved model to reduce
vector quantization attack. The above said methods are for JPEG
compressed images.
In this paper, we present a comparative study on various
watermarking schemes like spread spectrum, SCS-QIM, RDM
and the encryption methods used in coordination with those
watermarking schemes for JPEG2000 images. Compressed
images are mainly used in digital watermarking algorithms.
Watermarking algorithms are said to be effective if the
embedded watermark is robust against compression. The
encryption is done in the compressed JPEG2000 image except
the header and marker segment [9]. JPEG2000 images are being
used, since the decompression can be made at any ratio for the
same compression ratio [10]. There aremany encryption
algorithms proposed to work with watermarking algorithms.
Using asymmetric schemes with homomorphic property, the
RSA, Elgamel, Goldwasser-Micali, Paillierhave their own
drawbacks like, the ciphertext output results in loss of
compression efficiency if the message size is small and if the
message size is large the compression loss is reduced, but the
payload capacity decreases [11-14]. To overcome this
Subramanyam et al. in [15] proposed RC4 symmetric stream
cipher scheme with homomorphic property to achieve copyright
protection. Gayathri I.K. proposed the symmetric block cipher
RC5 [16] to work with the watermarking schemes used in [15].
RC5 is more secure and robust than RC4 due to its increased
number of rounds. RC6 is being used by Kukoo Anna Mathew
[17] instead of RC5 due to its increased use of registers.
II. TECHNICAL BACKGROUND
The watermarking schemes used to provide robustness and
the encryption schemes to secure the JPEG2000 images for copy
right protection and content authentication are listed below.
JPEG2000 standard
JPEG2000 is a compression standard that is based on
wavelet technology. Scalability and editability are its main
advantage. It meansfor a single encoding resolution, it can be
decoded at any resolution. Hence it needs computationally
complex encoders and decoders. JPEG2000 supports very low
and very high compression rates. It define both the file formats
and code streams. In JPEG2000 compression technique, the
color components of the input are transformed using irreversible
color or reversiblecolor transform. The output is tiled and then
wavelet transformed to an arbitrary depth using irreversible
orreversibletransform. It is then quantized and coded using
Embedded Block Coding with Optimized Truncation (EBCOT)
scheme to get the compressed output [18].The JPEG2000
compression standard processesthe output as byte streams.
Encryption Schemes
Encryption algorithms are used in co-ordination with the
watermarking schemes to make the JPEG2000 images more
robust so that it provides ownership verification & content
authentication.Various encryption schemes are discussed below,
RC4
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 9 No.26 (2014)
© Research India Publications; http://www.ripublication.com/ijaer.htm
9324
RC4 is a symmetric stream cipher with homomorphic
property. RC4 generates a pseudorandom stream of bits (a
keystream). As with any stream cipher, these can be used for
encryption by combining them with the plaintext using bit-wise
Exclusive-OR. Encryption is done in the input image byte by
byte. This is shown as,
C=E(M,Ks)
C =(mi + ki) mod 255 i = 0,1,2. . . .L-1
WhereM - Input image
C -cipher text
E - Encryption algorithm
Ks -key
Key generation is an important part in RC4 in which a secret
valueSvsharable by both the encryption and decryption side is
applied to RC4 which in turn generates the key stream ks[19].
RC5
RC5 is a homomorphic, symmetric-key block cipher which
has a variable block size (32, 64 or 128 bits), key size (0 to 2040
bits) and number of rounds (0 to 255).RC5 uses two registers
and modular addition. Key schedule is a complex part in RC5
[20].
A = A + S[0];
B = B + S[1];
for i = 1 to r do
A= ((A Xor B) <<< B) + S[ 2 * i ]
B = ((B Xor A) <<< A) + S[ 2 * i + 1]
Where
A, B - two w-bit words of the input in input registers
S - Expanded key table
RC6
RC6 is a symmetric keyblock cipher derived from RC5. Like
RC5, it can be parameterized to support a wide variety of word-
lengths, key sizes and number of rounds. But RC6 does include
the use offour working registers instead of twoand uses an extra
integer multiplication operation in order to make the rotation
dependent on every bit in a word, and not just the least
significant few bits.The encryption process is composed of three
stages viz., pre-whitening, inner loop of rounds, and post-
whitening. Plaintext revealing part of the input to the first round
and the ciphertext revealing part of the input to the last round of
encryption are removed bypre-whitening and post-
whitening.The operations used in RC6 are defined as followings
[21].
A+B integer addition modulo 2w
A-B integer subtraction modulo 2w
A⊕B bitwise exclusive-or of w-bit words
A x B integer multiplication modulo 2w
A⋘B rotation of the w-bit word A to the left by theamount
given by the least significant log w bits ofB
A⋙B rotation of the w-bit word A to the right by theamount
given by the least significant log w bits ofB
(A,B,C,D)=(B,C,D,A) parallel assignment.
Watermarking Algorithms
Watermarking algorithms are used to embed the watermark
inside the input image. The watermarking algorithm should be
robust for ownership verification and fragile for content
authentication.Image watermarking process should be one
without having any visual artifacts between the original and the
watermarked image. Few watermarking schemes are being
discussed below.
Spread Spectrum (SS)
Spread spectrum system has thetransmitted signal spread
over a wide frequency band.The codes are unique to every user
and have low cross correlation value. The main advantage of
spread spectrum is it blocks purposeful and
accidentalinterference. Since it uses pseudo random code
sequence, the privacy of the code is maintained [22]. The
watermarked vector may be expressed as
Wv= S + W
Where
Wv- Watermarked vector
S- Signal vector
W- Watermark vector
Both S and W are in the same vector space R
Scalar costa scheme(SCS)
Scalar costa scheme is a technique for embedding that
belongs to quantization based methods and it uses scalar
approach and reception function [23]. In scalar costa scheme the
Lx – dimensional codebook of costa scheme is replaced by a
product codebook that contains scalar quantizer of uniform step
size . The watermarked data is given as
Wm = M +W=M+ α (Qi(M)-M)
Where,
Wm- Watermarked sequence.
M - Message
W - Watermark sequence
α- Scalar factor / Distortiioncompensation parameter
Qi(M) - Quantization value of M using step size D.
Rational Dither Modulation (RDM)
RDM is a modification of Dither Modulation (DM) which
overcomes the vulnerability of scaling attack. It does not focus
on the step-size of the quantizer and hence avoids the usage of
pilot-sequence. It is used for carrying outscalar operation and
hence avoids the construction of spherical codes. RDMuses
gain-invariant adaptive quantization step-size at both embedder
and decoder. This causes the watermarked signal being
asymptotically stationary [25]. The embedding rule is given as
follows
where
yk- vector with„L‟ past samples of vector „y‟
g- isa function, that satisfies
with
-Quantiers
III. SECURITY OF CRYPTOSYSTEM
RC4
₳
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 9 No.26 (2014)
© Research India Publications; http://www.ripublication.com/ijaer.htm
9325
RC4 crypto system has the advantage of being faster and it is
suitable for streaming application [19].[26] proved that
relatively low sampling resistancein RC4 will increase the
probability of data tradeoff attacks based on the key scheduling
algorithm. Also the RC4 algorithm is weak in common mode of
operation and is commonly used in Wired Equivalent Privacy
Protocol (WEP).
RC5
RC5 algorithm is simple. The data dependent rotations and
the complexity in key scheduling are its advantages [27]. RC5-
32algorithm (32-bit blocks) is susceptible to known plain text
attack which is linear.From[28]it is shown that RC5-32 has a
factor of approximately 26
to attack an extra round and RC5-64
has around 28
.RC5-64 algorithm (64-bit blocks)is prone to
differential attack, when the chosen plain text is 244
. But it
overcomes the attack with 18 – 20 rounds.
RC6
RC6 is also susceptible to differential linear attack as that of
its predecessor RC5[28]. Linear attack is possible with 16
rounds with text size 2119
. With less than 15 rounds it undergoes
statistical attack [29]. RC6 is affected by X2
attack when the
number of rounds is more than 16[30]
IV. ROBUSTNESS OF EMBEDDING ALGORITHM
Spread Spectrum
An attack on spread spectrum watermarks based on
estimation of the watermarks is explained in [31]. Various
attacks that spread spectrum watermarking prone to are simple
attacks, detection disabling attacks, ambiguity attack, removal
attack etc.
Scalar Costa Scheme with QIM
Under AWGN attack the performance of Scalar Costa
Scheme is high compared to spread spectrum. Sospread
spectrum is of no use even when the watermark must survive
high noise level [24]. For high noise levels independent of the
host statistics and the document to watermark ratio the
achievable embedding rate of scalar costa scheme is smaller
than spread spectrum. When the watermark to noise ratio
increases, the scalar costa scheme outperforms spread spectrum
[24].
Rational Dither Modulation
Rational Dither Modulation has higher capacity than spread
spectrum and scalar costa scheme. It has benefits from the gains
afforded by distortion compensation and channel coding.
Moderately it is robust to Invariant value metric scaling attack
[25]. The RDM as in [25] poorly models the human perceptual
system and a function that models the properties of perception
should be considered [32]
V. CONCLUSION
The above comparative study discloses that a number of
watermarking and encryption schemes can be used for different
watermarking applications. The watermarking schemes
compared are robust and they can be used for content
authentication. The encryption algorithms which are explained
in this paper can be used in addition to the watermarking
schemes and can be applied for copy right protection. The
advantages and drawbacks the major water marking / encryption
schemes are being discussed here. The watermarking schemes
can all be together used with a single encrypion algorithm. The
research work can be extended to find a suitable encryption
scheme and watermarking algorithm to be put together to give a
robust watermarking for JPEG2000 images.
VI. REFERENCES
[1] Eggers JJ, Girod B. Blind watermarking applied to image authentication.
In:Proceedings of IEEE international conference on acoustics, speech and
signalprocessing. 2001. p. 1977–80.
[2] Kundur D, Hatzinakos D. Digital watermarking for telltale tamper
proofing andauthentication. In: Proceedings of the IEEEspecial issue on
identification andprotection of multimedia information. 1999. p. 1167–80.
[3] Lin ET, Podilchuk CI, Delp EJ. Detection of imagealterations using semi-
fragilewatermarks. In: Proceedings of SPIEconference on security and
watermarkingof multimedia contents II. 2000. p. 152–63.
[4] Wang MS, Chen WC. A majority-voting based watermarking scheme
forcolor image tamper detection and recovery. Computer Standards &
Interfaces2007;29:561–70.
[5] Fridrich J, Goljan M, Baldoza AC. New fragile authentication watermark
forimages. In: Proceeding of IEEE international conference on image
processing,vol. 1. 2000. p. 446–9.
[6] Memon N, Shende S, Wong P. On the security of the Yeung–Mintzer
authenticationwatermark. In: Proceedings of the IS&T PICS symposium.
1999. p. 301–6.
[7] Holliman M, Memon N. Counterfeiting attacks on oblivious block-
wiseindependent invisible watermarking schemes. IEEE Transactions on
Image Processing2000;9(3):432–41.
[8] Wong PW, Memon N. “Secret and public key image watermarking
schemes forimage authentication and ownership verification”. IEEE
Transactions on Image Processing 2001;10(10):1593–601.
[9] H. Wu and D.Ma, “Efficient and secure encryption schemes for
JPEG2000,” in Proc. IEEE Int. Conf. Acoustics, Speech and Signal
Processing, 2004, vol. 5, pp. 869–872.
[10] M. Rabbani and R. Joshi, “An overview of the JPEG 2000 still image
compression standard,” Signal Process.: Image Commun., vol. 17, no.1,
pp. 3–48, 2002.
[11] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital
signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no.2,
pp. 120–126, 1978.
[12] S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Comput.Syst.
Sci., vol. 28, no. 2, pp. 270–299, 1984.
[13] T. ElGamal, “A public key cryptosystem and a signature scheme based on
discrete logarithms,” IEEE Trans. Inf. Theory, vol. 31, no. 4, pp.469–472,
Jul. 1985.
[14] P. Paillier, “Public-key cryptosystems based on composite degree
residuosity classes,” Lecture Notes in Computer Science, pp. 223–
238,1999
[15] [15] A. Subramanyam, S. Emmanuel, and M. Kankanhalli, “Compressed
encrypted domain JPEG2000 image watermarking,” in Proc. IEEE Int.
Conf. Multimedia and Expo, 2010, pp. 1315–1320.
[16] [16]Gayathri I. K, “Digital Watermarking Using RC5 Encryption On
JPEG2000 Images” International Journal of Engineering Research &
Technology (IJERT) Vol. 2 Issue 7, July – 2013
[17] Mathew, Kukoo Anna. "Watermarking of JPEG2000 Compressed Images
with Improved Encryption." International Journal of Computer
Applications Technology and Research 2, no. 3: 245-249.
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 9 No.26 (2014)
© Research India Publications; http://www.ripublication.com/ijaer.htm
9326
[18] C. Christopoulos, A. Skodras, T. Ebrahimi, “The JPEG2000 Still Image
Coding System : An Overview”, IEEE Transactions on Consumer
Electronics, Vol. 46, No. 4, pp.1103-1127, november 2000.
[19] AllamMousa and Ahmad Hamad, "Evaluation of the RC4 Algorithm for
Data Encryption", International Journal of Computer Science &
Applications Vol. 3, No. 2 , June 2006, pp 44-56. (http://www. tmrfindia.
org/ijcsa/V3I24. pdf).
[20] H. Eldean Ahmed, H. M. Kalash, and O. S. Faragallah, "Implementation
of RC5 block cipher algorithm for image cryptosystem," International
Journal of Information Technology, vol. 3, no. 4, pp. 245-250, 2004.
[21] Rivest R.L., Robshaw M.J.B., Sidney R.,YinY.L., (1998) ”The RC6block
cipher.” AES-The First
AdvancedEncryptionStandardCandidateConference, Conference
Proceeings. http://people.csail.mit.edu/rivest/Rc6.pdf
[22] F. Hartung, J.K. Su, and B. Girod, “Spread spectrum watermarking:
Malicious attacks and counterattacks,” in Proc. SPIE Security and
Watermarking of Multimedia Contents 99, pp. 147–158, 1999.
[23] J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, “Scalar costa scheme
for information embedding”, IEEE Trans. Signal Process., vol. 51, no. 4,
pp. 1003–1019, Apr. 2003.
[24] L. Perez-Freire, F. Perez-Gonzalez, and S. Voloshynovskiy, "Revealing
the true achievable rates of scalar Costa scheme," inProc. IEEE
International Workshop on Multimedia Signal Processing
(MMSP), Siena, Italy, 2004.
[25] Perez-Gonzalez, F., Mosquera, C., Barni, M., and Abrardo, A.: „Rational
dither modulation: a high-rate data-hiding method invariant to gain
attacks‟. IEEE Trans. Signal Process., 2005, 53, pp. 3960–3975.
[26] S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key scheduling
algorithm of RC4,” in Selected Areas in Cryptography, 2001.
[27] B.S. Kaliski, Y.L. Yin, “On the Security of the RC5 Encryption
Algorithm,"RSA Laboratories Technical Report TR-602, Version 1.0,
September 1998.
[28] Johan Borst, Bart Preneel, JoosVandewalle K.U. Leuven, “Linear
Cryptanalysis of RC5 and RC6”, FSE 1999, Lecture Notes in
ComputerScience, Springer-Verlag, pp. 16-30, 1999.
[29] H. Gilbert, H.Handschuh, A. Joux, and S.Vaudenay, “Statistical Attack on
RC6”, FSE2000, LNCS 1978,pp.64-74, Springer-Verlag,2000
[30] A. Miyaji and T. Takano “Evaluation of the security of RC6 against the
x2-attack”, IEICE Trans., Fundamentals. vol. E90-A, No.1(2007), 22-28.
[31] G. Langelaar, R. Lagendijk, and J. Biemond, “Removing spatial spread
spectrum watermarks by non-linear_ltering," in Proceedings European
Signal Processing Conference (EUSIPCO 98), Rhodes, Greece,
September 1998.
[32] Cox I. J., LI Qiao. “Rational dither modulationwatermarking using a
perceptual model”, 2005 IEEE 7th
Workshop on Multimedia Signal
Processing, Oct, 2005

Mais conteúdo relacionado

Mais procurados

Arithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued LogicArithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued LogicVLSICS Design
 
A method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codesA method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codesAlexander Decker
 
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...IJMTST Journal
 
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...RSIS International
 
Algebraic methods for design QC-LDPC codes
Algebraic methods for design QC-LDPC codesAlgebraic methods for design QC-LDPC codes
Algebraic methods for design QC-LDPC codesUsatyuk Vasiliy
 
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI ArchitectureA Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI ArchitectureIRJET Journal
 
Comparison of Turbo Codes and Low Density Parity Check Codes
Comparison of Turbo Codes and Low Density Parity Check CodesComparison of Turbo Codes and Low Density Parity Check Codes
Comparison of Turbo Codes and Low Density Parity Check CodesIOSR Journals
 
Iaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd Iaetsd
 
Mapping of one model into other model
Mapping of one model into other modelMapping of one model into other model
Mapping of one model into other modelratikaagarwal
 
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...VLSICS Design
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor networkeSAT Journals
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor networkeSAT Publishing House
 
Efficient implementation of bit parallel finite field multipliers
Efficient implementation of bit parallel finite field multipliersEfficient implementation of bit parallel finite field multipliers
Efficient implementation of bit parallel finite field multiplierseSAT Publishing House
 
Efficient implementation of bit parallel finite
Efficient implementation of bit parallel finite Efficient implementation of bit parallel finite
Efficient implementation of bit parallel finite eSAT Journals
 
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...IJCNC
 
Fpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text messageFpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text messageeSAT Journals
 
Intra Frame Coding in H.264 to Obtain Consistent PSNR and Reduce Bit Rate for...
Intra Frame Coding in H.264 to Obtain Consistent PSNR and Reduce Bit Rate for...Intra Frame Coding in H.264 to Obtain Consistent PSNR and Reduce Bit Rate for...
Intra Frame Coding in H.264 to Obtain Consistent PSNR and Reduce Bit Rate for...RSIS International
 

Mais procurados (17)

Arithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued LogicArithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued Logic
 
A method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codesA method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codes
 
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
 
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
 
Algebraic methods for design QC-LDPC codes
Algebraic methods for design QC-LDPC codesAlgebraic methods for design QC-LDPC codes
Algebraic methods for design QC-LDPC codes
 
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI ArchitectureA Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
 
Comparison of Turbo Codes and Low Density Parity Check Codes
Comparison of Turbo Codes and Low Density Parity Check CodesComparison of Turbo Codes and Low Density Parity Check Codes
Comparison of Turbo Codes and Low Density Parity Check Codes
 
Iaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generator
 
Mapping of one model into other model
Mapping of one model into other modelMapping of one model into other model
Mapping of one model into other model
 
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor network
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor network
 
Efficient implementation of bit parallel finite field multipliers
Efficient implementation of bit parallel finite field multipliersEfficient implementation of bit parallel finite field multipliers
Efficient implementation of bit parallel finite field multipliers
 
Efficient implementation of bit parallel finite
Efficient implementation of bit parallel finite Efficient implementation of bit parallel finite
Efficient implementation of bit parallel finite
 
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
 
Fpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text messageFpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text message
 
Intra Frame Coding in H.264 to Obtain Consistent PSNR and Reduce Bit Rate for...
Intra Frame Coding in H.264 to Obtain Consistent PSNR and Reduce Bit Rate for...Intra Frame Coding in H.264 to Obtain Consistent PSNR and Reduce Bit Rate for...
Intra Frame Coding in H.264 to Obtain Consistent PSNR and Reduce Bit Rate for...
 

Destaque

Comparative Study of Watermarking and Encryption Schemes for JPEG2000 Images
Comparative Study of Watermarking and Encryption Schemes for JPEG2000 ImagesComparative Study of Watermarking and Encryption Schemes for JPEG2000 Images
Comparative Study of Watermarking and Encryption Schemes for JPEG2000 ImagesSebastin Antony Joe
 
2016 czajkowski-ipa 15-6-16
2016 czajkowski-ipa 15-6-162016 czajkowski-ipa 15-6-16
2016 czajkowski-ipa 15-6-16czajko
 
alcohol education. What does not work by Shakya Nanayakkara
alcohol education. What does not work by Shakya Nanayakkaraalcohol education. What does not work by Shakya Nanayakkara
alcohol education. What does not work by Shakya NanayakkaraShakya Nanayakkara
 

Destaque (7)

Comparative Study of Watermarking and Encryption Schemes for JPEG2000 Images
Comparative Study of Watermarking and Encryption Schemes for JPEG2000 ImagesComparative Study of Watermarking and Encryption Schemes for JPEG2000 Images
Comparative Study of Watermarking and Encryption Schemes for JPEG2000 Images
 
2016 czajkowski-ipa 15-6-16
2016 czajkowski-ipa 15-6-162016 czajkowski-ipa 15-6-16
2016 czajkowski-ipa 15-6-16
 
alcohol education. What does not work by Shakya Nanayakkara
alcohol education. What does not work by Shakya Nanayakkaraalcohol education. What does not work by Shakya Nanayakkara
alcohol education. What does not work by Shakya Nanayakkara
 
MSP UVT
MSP UVTMSP UVT
MSP UVT
 
Evaluation
EvaluationEvaluation
Evaluation
 
NOVEL SCHEME FOR COMPRESSED IMAGE AUTHENTICATION USING LSB WATERMARKING AND E...
NOVEL SCHEME FOR COMPRESSED IMAGE AUTHENTICATION USING LSB WATERMARKING AND E...NOVEL SCHEME FOR COMPRESSED IMAGE AUTHENTICATION USING LSB WATERMARKING AND E...
NOVEL SCHEME FOR COMPRESSED IMAGE AUTHENTICATION USING LSB WATERMARKING AND E...
 
Virdi 430 User Guide
Virdi 430 User GuideVirdi 430 User Guide
Virdi 430 User Guide
 

Semelhante a Comparative Study of Watermarking and Encryption Schemes for JPEG2000 Images

DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...ijiert bestjournal
 
Novel watermarkig scheme with watermark encryption for copyrig protec...
Novel  watermarkig        scheme with watermark encryption for copyrig protec...Novel  watermarkig        scheme with watermark encryption for copyrig protec...
Novel watermarkig scheme with watermark encryption for copyrig protec...Sebastin Antony Joe
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channelsiosrjce
 
S.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zoneS.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zonekalaiselvanresearch
 
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET Journal
 
NOVEL SCHEME FOR COMPRESSED IMAGE AUTHENTICATION USING LSB WATERMARKING AND E...
NOVEL SCHEME FOR COMPRESSED IMAGE AUTHENTICATION USING LSB WATERMARKING AND E...NOVEL SCHEME FOR COMPRESSED IMAGE AUTHENTICATION USING LSB WATERMARKING AND E...
NOVEL SCHEME FOR COMPRESSED IMAGE AUTHENTICATION USING LSB WATERMARKING AND E...Sebastin Antony Joe
 
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...IRJET Journal
 
An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...IJECEIAES
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
Compressed Image Authentication using CDMA Watermarking and EMRC6 Encryption
Compressed Image Authentication using CDMA Watermarking and EMRC6 EncryptionCompressed Image Authentication using CDMA Watermarking and EMRC6 Encryption
Compressed Image Authentication using CDMA Watermarking and EMRC6 EncryptionSebastin Antony Joe
 
Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...eSAT Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Vide...
Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Vide...Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Vide...
Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Vide...IJECEIAES
 

Semelhante a Comparative Study of Watermarking and Encryption Schemes for JPEG2000 Images (20)

DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
 
Novel watermarkig scheme with watermark encryption for copyrig protec...
Novel  watermarkig        scheme with watermark encryption for copyrig protec...Novel  watermarkig        scheme with watermark encryption for copyrig protec...
Novel watermarkig scheme with watermark encryption for copyrig protec...
 
Novel watermarkig scheme with watermark encryption for copyrig protec...
Novel  watermarkig        scheme with watermark encryption for copyrig protec...Novel  watermarkig        scheme with watermark encryption for copyrig protec...
Novel watermarkig scheme with watermark encryption for copyrig protec...
 
H017653645
H017653645H017653645
H017653645
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channels
 
S.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zoneS.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zone
 
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
 
THESIS FULL EXAMPLE
THESIS FULL EXAMPLETHESIS FULL EXAMPLE
THESIS FULL EXAMPLE
 
NOVEL SCHEME FOR COMPRESSED IMAGE AUTHENTICATION USING LSB WATERMARKING AND E...
NOVEL SCHEME FOR COMPRESSED IMAGE AUTHENTICATION USING LSB WATERMARKING AND E...NOVEL SCHEME FOR COMPRESSED IMAGE AUTHENTICATION USING LSB WATERMARKING AND E...
NOVEL SCHEME FOR COMPRESSED IMAGE AUTHENTICATION USING LSB WATERMARKING AND E...
 
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
 
An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...
 
14 vikram kumar_150-159
14 vikram kumar_150-15914 vikram kumar_150-159
14 vikram kumar_150-159
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Compressed Image Authentication using CDMA Watermarking and EMRC6 Encryption
Compressed Image Authentication using CDMA Watermarking and EMRC6 EncryptionCompressed Image Authentication using CDMA Watermarking and EMRC6 Encryption
Compressed Image Authentication using CDMA Watermarking and EMRC6 Encryption
 
Compressed Image Authentication using CDMA Watermarking and EMRC6 Encryption
Compressed Image Authentication using CDMA Watermarking and EMRC6 EncryptionCompressed Image Authentication using CDMA Watermarking and EMRC6 Encryption
Compressed Image Authentication using CDMA Watermarking and EMRC6 Encryption
 
Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...
 
E42032732
E42032732E42032732
E42032732
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Vide...
Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Vide...Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Vide...
Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Vide...
 
LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
 

Comparative Study of Watermarking and Encryption Schemes for JPEG2000 Images

  • 1. International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 9 No.26 (2014) pp. 9323-9326 © Research India Publications; http://www.ripublication.com/ijaer.htm Comparative Study of Watermarking and Encryption Schemes for JPEG2000 Images .J.Jereesha Mary, 2 S.Sebastin Antony Joe, 3 Dr.C.Seldev Christopher Abstract: The need for secured digital data is getting more intense and hence there is a necessity for ownership verification, tamper proof and data integrity. As a solution for these, digital watermarking methods may be used. In this paper, three watermarking schemes namely Spread Spectrum (SS), Scalar Costa scheme Quantization Index Modulation (SCS_QIM), Rational Dither Modulation (RDM) and the encryption techniques like RC4,RC5,RC6 which are responsible for the robustness of the above said watermarking system for JPEG2000 images are compared. The Peak Signal to Noise Ratio (PSNR) and the Mean Square Error (MSE) for different watermark images have been compared and presented in this paper. Keywords – RC4, RC5, RC6, Spread Spectrum, Scalar Costa Scheme Quantization Index modulation, Rational Dither Modulation,JPEG2000. INTRODUCTION Digital media communication and security for the digital content has seen a rapid growth in the current era. Digital Asser Management Systems (DAMS) are intended to work with compressed and encrypted data. Media contents liketext, image, audio, video, etc., can be secured using digital watermark techniques. Watermarking is a method that is used for reducing counterfeiting in which the watermark is embedded inside the message. This watermark can then be extracted or detected for variety of purposes. Image authentication with watermarking schemes was proposed by many researches in order to overcome the drawbacks of image authentication using digital signature schemes. In the latter scheme the modification of image or tampering can be identified,but the exact location of modification cannot be found [1-4]. Fridrich [5] proposed a block cipher method to prevent collage attack and Wong [6] proposed a public key fragile watermarking scheme for image authentication which was vulnerable to vector quantization attack. This was proven by Memon[7] and hence WongandMemon[8] proposed an improved model to reduce vector quantization attack. The above said methods are for JPEG compressed images. In this paper, we present a comparative study on various watermarking schemes like spread spectrum, SCS-QIM, RDM and the encryption methods used in coordination with those watermarking schemes for JPEG2000 images. Compressed images are mainly used in digital watermarking algorithms. Watermarking algorithms are said to be effective if the embedded watermark is robust against compression. The encryption is done in the compressed JPEG2000 image except the header and marker segment [9]. JPEG2000 images are being used, since the decompression can be made at any ratio for the same compression ratio [10]. There aremany encryption algorithms proposed to work with watermarking algorithms. Using asymmetric schemes with homomorphic property, the RSA, Elgamel, Goldwasser-Micali, Paillierhave their own drawbacks like, the ciphertext output results in loss of compression efficiency if the message size is small and if the message size is large the compression loss is reduced, but the payload capacity decreases [11-14]. To overcome this Subramanyam et al. in [15] proposed RC4 symmetric stream cipher scheme with homomorphic property to achieve copyright protection. Gayathri I.K. proposed the symmetric block cipher RC5 [16] to work with the watermarking schemes used in [15]. RC5 is more secure and robust than RC4 due to its increased number of rounds. RC6 is being used by Kukoo Anna Mathew [17] instead of RC5 due to its increased use of registers. II. TECHNICAL BACKGROUND The watermarking schemes used to provide robustness and the encryption schemes to secure the JPEG2000 images for copy right protection and content authentication are listed below. JPEG2000 standard JPEG2000 is a compression standard that is based on wavelet technology. Scalability and editability are its main advantage. It meansfor a single encoding resolution, it can be decoded at any resolution. Hence it needs computationally complex encoders and decoders. JPEG2000 supports very low and very high compression rates. It define both the file formats and code streams. In JPEG2000 compression technique, the color components of the input are transformed using irreversible color or reversiblecolor transform. The output is tiled and then wavelet transformed to an arbitrary depth using irreversible orreversibletransform. It is then quantized and coded using Embedded Block Coding with Optimized Truncation (EBCOT) scheme to get the compressed output [18].The JPEG2000 compression standard processesthe output as byte streams. Encryption Schemes Encryption algorithms are used in co-ordination with the watermarking schemes to make the JPEG2000 images more robust so that it provides ownership verification & content authentication.Various encryption schemes are discussed below, RC4
  • 2. International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 9 No.26 (2014) © Research India Publications; http://www.ripublication.com/ijaer.htm 9324 RC4 is a symmetric stream cipher with homomorphic property. RC4 generates a pseudorandom stream of bits (a keystream). As with any stream cipher, these can be used for encryption by combining them with the plaintext using bit-wise Exclusive-OR. Encryption is done in the input image byte by byte. This is shown as, C=E(M,Ks) C =(mi + ki) mod 255 i = 0,1,2. . . .L-1 WhereM - Input image C -cipher text E - Encryption algorithm Ks -key Key generation is an important part in RC4 in which a secret valueSvsharable by both the encryption and decryption side is applied to RC4 which in turn generates the key stream ks[19]. RC5 RC5 is a homomorphic, symmetric-key block cipher which has a variable block size (32, 64 or 128 bits), key size (0 to 2040 bits) and number of rounds (0 to 255).RC5 uses two registers and modular addition. Key schedule is a complex part in RC5 [20]. A = A + S[0]; B = B + S[1]; for i = 1 to r do A= ((A Xor B) <<< B) + S[ 2 * i ] B = ((B Xor A) <<< A) + S[ 2 * i + 1] Where A, B - two w-bit words of the input in input registers S - Expanded key table RC6 RC6 is a symmetric keyblock cipher derived from RC5. Like RC5, it can be parameterized to support a wide variety of word- lengths, key sizes and number of rounds. But RC6 does include the use offour working registers instead of twoand uses an extra integer multiplication operation in order to make the rotation dependent on every bit in a word, and not just the least significant few bits.The encryption process is composed of three stages viz., pre-whitening, inner loop of rounds, and post- whitening. Plaintext revealing part of the input to the first round and the ciphertext revealing part of the input to the last round of encryption are removed bypre-whitening and post- whitening.The operations used in RC6 are defined as followings [21]. A+B integer addition modulo 2w A-B integer subtraction modulo 2w A⊕B bitwise exclusive-or of w-bit words A x B integer multiplication modulo 2w A⋘B rotation of the w-bit word A to the left by theamount given by the least significant log w bits ofB A⋙B rotation of the w-bit word A to the right by theamount given by the least significant log w bits ofB (A,B,C,D)=(B,C,D,A) parallel assignment. Watermarking Algorithms Watermarking algorithms are used to embed the watermark inside the input image. The watermarking algorithm should be robust for ownership verification and fragile for content authentication.Image watermarking process should be one without having any visual artifacts between the original and the watermarked image. Few watermarking schemes are being discussed below. Spread Spectrum (SS) Spread spectrum system has thetransmitted signal spread over a wide frequency band.The codes are unique to every user and have low cross correlation value. The main advantage of spread spectrum is it blocks purposeful and accidentalinterference. Since it uses pseudo random code sequence, the privacy of the code is maintained [22]. The watermarked vector may be expressed as Wv= S + W Where Wv- Watermarked vector S- Signal vector W- Watermark vector Both S and W are in the same vector space R Scalar costa scheme(SCS) Scalar costa scheme is a technique for embedding that belongs to quantization based methods and it uses scalar approach and reception function [23]. In scalar costa scheme the Lx – dimensional codebook of costa scheme is replaced by a product codebook that contains scalar quantizer of uniform step size . The watermarked data is given as Wm = M +W=M+ α (Qi(M)-M) Where, Wm- Watermarked sequence. M - Message W - Watermark sequence α- Scalar factor / Distortiioncompensation parameter Qi(M) - Quantization value of M using step size D. Rational Dither Modulation (RDM) RDM is a modification of Dither Modulation (DM) which overcomes the vulnerability of scaling attack. It does not focus on the step-size of the quantizer and hence avoids the usage of pilot-sequence. It is used for carrying outscalar operation and hence avoids the construction of spherical codes. RDMuses gain-invariant adaptive quantization step-size at both embedder and decoder. This causes the watermarked signal being asymptotically stationary [25]. The embedding rule is given as follows where yk- vector with„L‟ past samples of vector „y‟ g- isa function, that satisfies with -Quantiers III. SECURITY OF CRYPTOSYSTEM RC4 ₳
  • 3. International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 9 No.26 (2014) © Research India Publications; http://www.ripublication.com/ijaer.htm 9325 RC4 crypto system has the advantage of being faster and it is suitable for streaming application [19].[26] proved that relatively low sampling resistancein RC4 will increase the probability of data tradeoff attacks based on the key scheduling algorithm. Also the RC4 algorithm is weak in common mode of operation and is commonly used in Wired Equivalent Privacy Protocol (WEP). RC5 RC5 algorithm is simple. The data dependent rotations and the complexity in key scheduling are its advantages [27]. RC5- 32algorithm (32-bit blocks) is susceptible to known plain text attack which is linear.From[28]it is shown that RC5-32 has a factor of approximately 26 to attack an extra round and RC5-64 has around 28 .RC5-64 algorithm (64-bit blocks)is prone to differential attack, when the chosen plain text is 244 . But it overcomes the attack with 18 – 20 rounds. RC6 RC6 is also susceptible to differential linear attack as that of its predecessor RC5[28]. Linear attack is possible with 16 rounds with text size 2119 . With less than 15 rounds it undergoes statistical attack [29]. RC6 is affected by X2 attack when the number of rounds is more than 16[30] IV. ROBUSTNESS OF EMBEDDING ALGORITHM Spread Spectrum An attack on spread spectrum watermarks based on estimation of the watermarks is explained in [31]. Various attacks that spread spectrum watermarking prone to are simple attacks, detection disabling attacks, ambiguity attack, removal attack etc. Scalar Costa Scheme with QIM Under AWGN attack the performance of Scalar Costa Scheme is high compared to spread spectrum. Sospread spectrum is of no use even when the watermark must survive high noise level [24]. For high noise levels independent of the host statistics and the document to watermark ratio the achievable embedding rate of scalar costa scheme is smaller than spread spectrum. When the watermark to noise ratio increases, the scalar costa scheme outperforms spread spectrum [24]. Rational Dither Modulation Rational Dither Modulation has higher capacity than spread spectrum and scalar costa scheme. It has benefits from the gains afforded by distortion compensation and channel coding. Moderately it is robust to Invariant value metric scaling attack [25]. The RDM as in [25] poorly models the human perceptual system and a function that models the properties of perception should be considered [32] V. CONCLUSION The above comparative study discloses that a number of watermarking and encryption schemes can be used for different watermarking applications. The watermarking schemes compared are robust and they can be used for content authentication. The encryption algorithms which are explained in this paper can be used in addition to the watermarking schemes and can be applied for copy right protection. The advantages and drawbacks the major water marking / encryption schemes are being discussed here. The watermarking schemes can all be together used with a single encrypion algorithm. The research work can be extended to find a suitable encryption scheme and watermarking algorithm to be put together to give a robust watermarking for JPEG2000 images. VI. REFERENCES [1] Eggers JJ, Girod B. Blind watermarking applied to image authentication. In:Proceedings of IEEE international conference on acoustics, speech and signalprocessing. 2001. p. 1977–80. [2] Kundur D, Hatzinakos D. Digital watermarking for telltale tamper proofing andauthentication. In: Proceedings of the IEEEspecial issue on identification andprotection of multimedia information. 1999. p. 1167–80. [3] Lin ET, Podilchuk CI, Delp EJ. Detection of imagealterations using semi- fragilewatermarks. In: Proceedings of SPIEconference on security and watermarkingof multimedia contents II. 2000. p. 152–63. [4] Wang MS, Chen WC. A majority-voting based watermarking scheme forcolor image tamper detection and recovery. Computer Standards & Interfaces2007;29:561–70. [5] Fridrich J, Goljan M, Baldoza AC. New fragile authentication watermark forimages. In: Proceeding of IEEE international conference on image processing,vol. 1. 2000. p. 446–9. [6] Memon N, Shende S, Wong P. On the security of the Yeung–Mintzer authenticationwatermark. In: Proceedings of the IS&T PICS symposium. 1999. p. 301–6. [7] Holliman M, Memon N. Counterfeiting attacks on oblivious block- wiseindependent invisible watermarking schemes. IEEE Transactions on Image Processing2000;9(3):432–41. [8] Wong PW, Memon N. “Secret and public key image watermarking schemes forimage authentication and ownership verification”. IEEE Transactions on Image Processing 2001;10(10):1593–601. [9] H. Wu and D.Ma, “Efficient and secure encryption schemes for JPEG2000,” in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, 2004, vol. 5, pp. 869–872. [10] M. Rabbani and R. Joshi, “An overview of the JPEG 2000 still image compression standard,” Signal Process.: Image Commun., vol. 17, no.1, pp. 3–48, 2002. [11] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no.2, pp. 120–126, 1978. [12] S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Comput.Syst. Sci., vol. 28, no. 2, pp. 270–299, 1984. [13] T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inf. Theory, vol. 31, no. 4, pp.469–472, Jul. 1985. [14] P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” Lecture Notes in Computer Science, pp. 223– 238,1999 [15] [15] A. Subramanyam, S. Emmanuel, and M. Kankanhalli, “Compressed encrypted domain JPEG2000 image watermarking,” in Proc. IEEE Int. Conf. Multimedia and Expo, 2010, pp. 1315–1320. [16] [16]Gayathri I. K, “Digital Watermarking Using RC5 Encryption On JPEG2000 Images” International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 7, July – 2013 [17] Mathew, Kukoo Anna. "Watermarking of JPEG2000 Compressed Images with Improved Encryption." International Journal of Computer Applications Technology and Research 2, no. 3: 245-249.
  • 4. International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 9 No.26 (2014) © Research India Publications; http://www.ripublication.com/ijaer.htm 9326 [18] C. Christopoulos, A. Skodras, T. Ebrahimi, “The JPEG2000 Still Image Coding System : An Overview”, IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp.1103-1127, november 2000. [19] AllamMousa and Ahmad Hamad, "Evaluation of the RC4 Algorithm for Data Encryption", International Journal of Computer Science & Applications Vol. 3, No. 2 , June 2006, pp 44-56. (http://www. tmrfindia. org/ijcsa/V3I24. pdf). [20] H. Eldean Ahmed, H. M. Kalash, and O. S. Faragallah, "Implementation of RC5 block cipher algorithm for image cryptosystem," International Journal of Information Technology, vol. 3, no. 4, pp. 245-250, 2004. [21] Rivest R.L., Robshaw M.J.B., Sidney R.,YinY.L., (1998) ”The RC6block cipher.” AES-The First AdvancedEncryptionStandardCandidateConference, Conference Proceeings. http://people.csail.mit.edu/rivest/Rc6.pdf [22] F. Hartung, J.K. Su, and B. Girod, “Spread spectrum watermarking: Malicious attacks and counterattacks,” in Proc. SPIE Security and Watermarking of Multimedia Contents 99, pp. 147–158, 1999. [23] J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, “Scalar costa scheme for information embedding”, IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1003–1019, Apr. 2003. [24] L. Perez-Freire, F. Perez-Gonzalez, and S. Voloshynovskiy, "Revealing the true achievable rates of scalar Costa scheme," inProc. IEEE International Workshop on Multimedia Signal Processing (MMSP), Siena, Italy, 2004. [25] Perez-Gonzalez, F., Mosquera, C., Barni, M., and Abrardo, A.: „Rational dither modulation: a high-rate data-hiding method invariant to gain attacks‟. IEEE Trans. Signal Process., 2005, 53, pp. 3960–3975. [26] S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4,” in Selected Areas in Cryptography, 2001. [27] B.S. Kaliski, Y.L. Yin, “On the Security of the RC5 Encryption Algorithm,"RSA Laboratories Technical Report TR-602, Version 1.0, September 1998. [28] Johan Borst, Bart Preneel, JoosVandewalle K.U. Leuven, “Linear Cryptanalysis of RC5 and RC6”, FSE 1999, Lecture Notes in ComputerScience, Springer-Verlag, pp. 16-30, 1999. [29] H. Gilbert, H.Handschuh, A. Joux, and S.Vaudenay, “Statistical Attack on RC6”, FSE2000, LNCS 1978,pp.64-74, Springer-Verlag,2000 [30] A. Miyaji and T. Takano “Evaluation of the security of RC6 against the x2-attack”, IEICE Trans., Fundamentals. vol. E90-A, No.1(2007), 22-28. [31] G. Langelaar, R. Lagendijk, and J. Biemond, “Removing spatial spread spectrum watermarks by non-linear_ltering," in Proceedings European Signal Processing Conference (EUSIPCO 98), Rhodes, Greece, September 1998. [32] Cox I. J., LI Qiao. “Rational dither modulationwatermarking using a perceptual model”, 2005 IEEE 7th Workshop on Multimedia Signal Processing, Oct, 2005