Академический Документы
Профессиональный Документы
Культура Документы
Vol.06,Issue.10,
November-2014,
Pages:1105-1110
www.ijatir.org
Implementation of Encryption Method for Homomorphic Images using DWT and MRA
In order to embed a watermark on an encrypted image,
in large variation in the spatial domain 5. Thus the
we should tackle two challenging issues. The first one is
decrypted values are very likely to be greater than 255 or
how to achieve the goal of blind watermark exaction. Since
less than 0.
the original image is protected by the encryption, it is not
practical to involve the plain original image into the
(5)
extraction (fig 1).
(6)
{wj}will be compared with the embedding message {wj}by
using the BER metric to output the result that whether there
is a watermark in Iw;256(x; y)6.
Implementation of Encryption Method for Homomorphic Images using DWT and MRA
implemented in the encrypted domain. However, in nondecryption and the desired image. By using it is easy to
interactive cases, it is very difficult to obtain the local
obtain the final watermarked image (k).
information of the original image, due to the encryption. As
a solution, we employ Coxs watermarking scheme and
C. Investigating the Value of
implement it in the encrypted domain. Specifically, a
We can efficiently compute by using the Euclidean
random small value k, l is used instead of the local
algorithm. The value of mainly depends on four
amplitude factor to make the watermark invisible.
parameters, the quantization factor Q, the wavelet
Watermark embedding in the plaintext domain can be
reconstruction level , the cryptosystems modular N, and
described, where k, l is randomly chosen in {1, 2, . . . ,}
the dimension i of the input signal. We investigate the value
and is a specified small integer. The watermark signal {y
of for some popular rational filter wavelet bases,
(k, l)} is an integer value signal. In the encrypted domain,
including the Haar wavelet, the CDF 5/3 wavelet and the
watermark embedding can be carried out as
biorthogonal spline 1.3 wavelet. For convenience, the input
(10)
signal is assumed to be one dimensional. Since a 1024-bit
is a lengthy string, we compute the value of with a small
In our experiment, we use the same quantization factor Q
64
key cryptosystem, that is N = 106060113287377. In Table I,
= 2 for the Haar wavelet transform. A Gaussian noise is
we summarize the value of the expansion factor K and its
chosen as the watermark signal. After performing five-level
multiplicative inverse for some frequently used
DWT on the input encrypted image, we add the Gaussian
reconstruction levels.
noise as a watermark into the low frequency bands (LL) of
the five level coefficients (10). We perform five-level
TABLE I: EXPANDING FACTOR K AND ITS
IDWT on the modified results to obtain the watermarked
MULTIPLICATIVE INVERSE FOR THREE TYPES OF
WAVELET: THE HAAR WAVELET, THE CDF 5/3
WAVELET, AND THE BIORTHOGONAL SPLINE 1.3
WAVELET. THE MODULUS IS N = 106060113287377
V. CONCLUSION
In This paper has investigated the implementation of
DWT and MRA in a homomorphic encrypted domain and
tackled the problem of data expansion caused by
quantization. The main contributions are listed as follows.
1. We have proposed a framework to implement DWT
and MRA in the encrypted domain by using
homomorphic properties. Compared with plaintext
Fig.4. Image watermarking scheme based on Haar
DWT, DWT in the encrypted domain will expand the
Wavelet transform in the encrypted domain. (a)
plaint value of the processed data. We have derived an
Watermarking in the encrypted domain. (b) Decryption
upper bound on the expanded data, regardless of the
of watermarking in the encrypted domain. (c)
kind of wavelet.
Watermarking with MIM. (d) Decryption of
2.
For a class of wavelet transform, i.e., the rational filter
watermarking with MIM.
coefficients wavelet transforms, we have presented a
image in the encrypted domain. The encrypted version of
method to perform DWT/IDWT in the encrypted
the watermarked image and its decryption are shown in Fig.
domain without any quantization error. MIM is
4(a), (b). The decryption looks quite different from the
proposed to remove the expanding factor without
watermarked image as we expect. In order to recover the
decrypting. The proposed method improves the
desired watermarked image, we apply MIM to the encrypted
capacity of signal processing with the same
version of the watermarked image by means. The processed
cryptosystem parameters.
result and its decryption are shown in Fig. 4(c), (d). The
3. MIM has been applied to various signal processing
decryption looks the same as the expected watermarked
applications in the encrypted domain. We have shown a
image. In fact, there is only one scaling factor between the
comparison of the performance of MRA in the
encrypted domain with and without MIM. We have also
International Journal of Advanced Technology and Innovative Research
Volume. 06, IssueNo.10, November-2014, Pages: 1105-1110