Digital Watermarking Using RC5 Encryption On JPEG2000 Images

DOI : 10.17577/IJERTV2IS70609

Download Full-Text PDF Cite this Publication

Text Only Version

Digital Watermarking Using RC5 Encryption On JPEG2000 Images

Gayathri I. K M.Tech,Communication Engineering, FISAT

Abstract

For the rapid revolution in digital multimedia and the ease of creating similar and unauthorized data, the digital data can be copied or manipulated or distributed. So it is necessary to watermark the media content for tamper proofing or quality assessment or copy control. In this paper we propose a digital watermarking using RC5 encryption on JPEG2000 images. The compression standard is chosen such that it provides higher compression ratio and the compressed byte stream are randomized by the encryption algorithm. The proposed encryption algorithm used here is a block cipher. In our paper watermarking was done in the compressed encrypted domain. We use different watermarking techniques for this. The watermarked data can be detected both in the encrypted and decrypted domain. The PSNR values of three watermarking schemes are also measured.

Keywords

JPEG2000, RC5, watermarking, Compressed Domain, Watermark Extraction, Watermark Embedding, Encrypted Domain, PSNR etc.

  1. Introduction

    Nowadays, the protection and enforcement of intellectual property rights for digital media is becoming increasingly important. In order to prevent the users from unauthorized copying of digital content and to control its use, digital rights management (DRM) technologies were developed.

    DRM uses digital watermarking techniques to prevent consumers from unauthorized copying of digital media and to control the use of digital content.

    Anil Kumar M. N

    Assistant Professor,

    Electronics and Communication Engineering, FISAT

    Digital watermarking is the process of embedding information into digital media content. The embedded information can later be extracted or detected for a variety of purposes including copyright protection, transaction tracking etc. This provides an indication of ownership of the digital data. Digital watermarking can be applied to media like text, audio, image, video etc. The watermark might contain additional information including the identity of the purchaser of a particular copy of the object.

    In this paper, we propose a digital watermarking on JPEG2000 images in which the watermark can be embedded in a predictable manner. In [1] A.V. Subramanyam et.al proposed a robust digital watermarking on compressed and encrypted domain.

    Watermarking in compressed-encrypted domain saves the computational quality and also preserves the confidentiality of the content. In this proposed algorithm we use three watermarking schemes: Spread Spectrum (SS), Scalar Costa Scheme Quantization Index Modulation (SCS-QIM), and Rational Dither Modulation (RDM).

    In this paper we use RC5 block cipher as the encryption algorithm. It is a symmetric block cipher. The main features of RC5 are data – dependent rotations, variable block size, variable number of rounds and variable key size.

    This paper is organized as follows. Section II describes the methodology. In section III we discuss the security of encryption algorithm. The experimental results are discussed in section IV and the conclusion of the paper is done in Section V.

  2. Methodology

    In the proposed scheme the image was compressed by using JPEG2000 compression standard. The JPEG2000 encoder provides a set of features that are of importance to many high end and emerging applications by taking advantage of new technologies. The compression standard is divided into five different stages. The first stage is component and tile separation, whose function is to cut the image into manageable chunks and to decorrelate the color components. Huge original images are separated into spatially non overlapping tiles of equal size and finally a multi-component transform is performed. In the second stage the data are first transformed in the wavelet domain followed by quantization in the third stage. After that, the quantized coefficients are regrouped to facilitate localized spatial and resolution access. These resolutions are further divided into smaller blocks known as code-blocks where each code block is encoded independently. In the fourth stage, each code-block is decomposed into number of bit-planes and are then entropy encoded using fractional bit-plane coding and binary arithmetic coding that provides a stream of compressed data.

    2-round keys Each of w-bit

    2-round keys Each of w-bit

    The compressed byte stream is arranged into different

    the watermarked signal is generated using C which is shown as dotted line in the figure.

    2.1 RC5 Algorithm

    From the compression standard we get packetized byte stream M as its output. The message M , should be encrypted using RC5 block cipher. Thus we get C as the encrypted output. This C is fed to the watermarking module for generating the watermarked data.

    RC5 algorithm was developed by Ronald Rivest. This algorithm is a block cipher that converts plain text data blocks of 16, 32 and 64 bits into cipher test blocks of same length. It uses a key of selectable length b byte. The key size can range from 0 bits to 2040 bits. In this algorithm a variable number of rounds(r) is used that takes values in the range 0-255, as illustrated in Fig.2

    Plain image 2w-bit

    Initial Key Addition

    Initial Key Addition

    Key b- byte

    Key

    wavelet packets based on resolution, precincts and layers in the final stage.

    Thus the compressed byte stream is given to the RC5 encryption algorithm. The RC5 is a symmetric block cipher and it also provides better security.

    C

    Schedule

    2r-round keys

    Mixing Circular- shift Key Addition

    r -rounds

    JPEG2000

    Encoder

    JPEG2000

    Encoder

    RC5

    Encryption

    RC5

    Encryption

    I M C W

    W

    Watermark Signal Generation

    Watermark Signal Generation

    Fig.1 watermark embedding

    Fig.1 shows the watermark embedding process. The watermark was embedded in the compressed encrypted domain. For Spread Spectrum watermarking scheme, the watermark signal is generated without using the host signal. In the case of Scalar Costa Scheme Quantization Index Modulation (SCS-QIM), and Rational Dither Modulation (RDM)

    Each of w-bit

    Cipher image

    Fig .2 RC5 Encryption Algorithm

    The RC5 algorithm uses three primitive operations and their inverses.

    1. Twos complement addition of words, denoted by +

    2. Bit-wise exclusive -or(XOR)

    (3)A left rotation of words: the cyclic rotation of word x left by y bits is denoted x<<<y. The inverse operation, right rotation is denoted by x>>>y

    In the key expansion module, the key K is expanded to a much larger size using an expansion table(S).

    The size of the table S is (2r+2), where r is the number of rounds. Before every encryption or decryption processes, the key expansion process should be performed. The encryption process takes a plain text input and produces a cipher text as the output. The reverse operation should be done in the decryption part.

        1. Key Expansion

          The key expansion algorithm expands the users secret key to a much larger size using an expansion table(S). The size of the table S is (2r+2). It uses two magic constants and consists of three simple algorithms

          Definition of the constants:

          The key expansion algorithm uses two word sized binary constants Pw and Qw. They are defined for arbitrary w as follows

          Pw = Odd((e – 2)2w) (1)

          Qw = Odd(( – 1)w) (2)

          where

          e=2.718281828. (base of natural logarithms)

          =1.618033988. (golden ratio = (1+sqr(5))/2) Odd(x): odd integer nearest to x

          The three algorithms are defined as follows Step 1: Convert secret key bytes to words

          Step 2: Initialize sub key array S (S[0],S[1],,S(t-1)) Step 3: Mix the secret key into sub key array S

        2. Encryption

          The input block is given in two w-bit registers A and

          B. The output is also placed in the registers A and B. The encryption algorithm is done as follows.

        3. Decryption

          The decryption routine is easily derived from the encryption routine. The decryption is done as follows.

          Steps:

          1. for i= r down to 1 do

            B ((B S[2i 1]) A) A A (( A S[2i]) B) B

          2. B= B – S[1]

          3. A= A- S[0]

    2.2 Watermark Embedding Algorithm

    The watermark is embedded to the compressed- encrypted domain. The embedding algorithm used here is the additive watermarking technique. The robust additive watermarking technique is the most straightforward method in spatial domain such that the pseudo random noise pattern is added to the intensity of image pixels. For watermark embedding the ciphered bytes from the least significant bit plane of an image were considered. Here we consider the three watermarking techniques and each of one are explained below.

    2.2.1 SS

    In SS watermarking scheme, a narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented in any signal frequency is undetectable. In this scheme the embedding process is carried out by first generating the watermark signal

    1. This W can be generated using information bits b, chip rate r and pseudo noise sequence P ={pj} where pj ={1,-1}. The information bits b are spread by r ,

      where b ={1,-1} which gives

      Steps:

      1. A=A + S[0]

        aj bi ,ir

        j (i 1)r

        (3)

      2. B=B + S[1]

      3. for i= 1 to r do

    This sequence is multiplied by > 0 and P, and finally we get the watermark signal W= {wj }, where

    A (( A B) B) S[2i]

    B ((B A) A) S[2i 1]

    wj aj pj

    (4)

    The generated watermark signal in (4) is added to the encrypted signal C, to give the watermarked signal Cw

    2.3 Watermark Extraction Algorithm

    From the encrypted and decrypted domain the watermark data can be detected. Fig.3 shows the

    Cw C W ci wi ,for all i= 0,1,.L-1

    (5)

    2.2. 2 SCS-QIM

    For SCS-QIM watermarking, the watermark message is encoded into a sequence of watermark letters d,

    watermark extraction module.

    Cw Mw

    RC5

    Decryption

    C

    Watermark detected (Yes/No)

    Watermark Detection

    where d[n]{0,1} .Each of the watermark letters

    is embedded into the corresponding host elements x[n] . For making the codebook secure a random sequence K can be chosen such that k[n] (0, 1]. The embedding rule is given by

    qn Q (x[n] (d[n]/ 2 k)) (x[n] (d[n]/ 2 k))

    (6)

    Here Q(.) denotes a scalar uniform quantization with step size . This embedding scheme depends on two parameters: the quantizer step size and the scale factor . The watermark sequence is then given by

    K P

    JPEG2000

    Decoder

    JPEG2000

    Decoder

    Iw

    Fig .3 Watermark Extraction

    2.3.1 Encrypted Domain Detection

    As shown in Fig.3, the Cw is directly fed to the watermark detection module. The watermark detection process is formed using the above three watermarking techniques.

    W * qn

    Finally the watermarked signal is obtained as

    Cw C W

    2.2.3 RDM

    (7)

    (8)

          1. SS

            In this scheme, the Cw is fed to the watermark detection module and this will be multiplied by pseudo noise sequence and followed by summation over chip rate, yielding the correlation sum Si . The

            This scheme is based on the quantization of the ratio of host signal to a function.The function is chosen such that the scheme is robust against amplitude scaling attacks and is given by

            sign of Si gives the watermark information bit.

            i wj j j j j i p

            i wj j j j j i p

            S (c p ) (c w ) p b 2r

            (13)

            g(c

            ) (1/ L

            i1

            c )1/ , 1

          2. SCS-QIM

            wi1

            m wj

            j iLm

            (9)

            In this method, by quantizing the received signal to

            The quantizers are given by

            Q ' 2 w / 2

            (10)

            the nearest data in the codebook, the watermark data is detected. For this purpose we use the equation

            where w {-1,1} is the watermark information to be embedded in the host element. The embedding rule is

            then given by

            w Q (cwi ) cwi

            (14)

            c g(c

            )Q ' (c / g(c ))

            If w = 0 , then watermark bit zero is extracted and

            wi wi1

            i wi1

            (11)

            if close to /2 , then bit one is retrieved.

            where cwi and cwi -1 are the current and previous watermarked samples . Thus the additive nature of watermark is given as

            wi cwi ci

            (12)

          3. RDM

            By using the minimum distance criteria, the detection of watermark is performed by applying the equation

            histogram of original and encrypted images is taken. From this we can find that the encrypted image is fairly uniform and different from that of the original one.

            2

            c c

            w arg min wi Q ' wi

            The watermarked data is added in the compressed

            1,1

            g(cwi1 )

            g(cwi1 )

            (15)

            encrypted domain. This provides better security than other schemes because the image is first compressed and after that it is encrypted and then only watermark

            Here Q '

            gives two quantizers belonging to bits 1

            data is added. Thus the watermarked datas are

            and -1. From this, the minimum distance gives the watermark bit.

        1. Decrypted Domain Detection

    In the decrypted domain watermark bit detection, we use the above three watermarking schemes. Here the Cw is fed to the RC5 decryption module. From that we will obtain the Mw as the output. This Mw is encrypted by using the key and will obtain the Cw. For watermark detection remove C from Cw. The above procedure was done in three watermarking schemes and finally the watermarked data can be obtained. Also the decrypted message will be fed to the JPEG2000 encoder and will generate the original image.

    entirely distributed in the lowest bit plane of an image. For this purpose we use additive watermarking technique. Thus at the receiver side any change or modification in the watermarked data can be found out by decrypting the data with the same key. Thus it is robust against most attacks in the digital world and protects the copyright content and prevents its distribution.

    3.2 Experimental Results

    1

    1

    The experimental results shall be carried out in the images of baboon, cameraman, boat and goldhill. For this purpose we measure the PSNR of three watermarking schemes. The PSNR is calculated using the following equation.

  3. Results and Discussions

    10

    10

      1. Security of Encryption Algorithm

        m1 n1

        MSE (I (i, j) Iw

        mn i0 j 0

        (i, j))2

        (16)

        The three routines in RC5 are key expansion, encryption and decryption. In the key expansion, the user provided a secret key, which is expanded to fill a

        PSNR 10log (2552 / MSE)

        (17)

        key table whose size depends on the number of rounds. Key table is used in both encryption and decryption. RC5 is a symmetric block cipher, which means the same secret key is used for encryption and decryption. It is suitable for ardware and software. It is adaptable to processors of different word lengths. It is simple to implement, fast and require low memory. The number of rounds is an important parameter in RC5. Choosing large number of rounds provides an increased level of security. The security of RC5 block cipher is estimated for digital images, even under brute-force attack, statistical and differential attacks.

        For selecting the word size 32 bits, RC5 allows a maximum of 2040 secret key bits and a maximum of 25(2r+2) expandable key table bits. Thus by choosing large values of r and b can prevent exhaustive attacks. In the case of statistical analysis, the

        The figure shows the image of a baboon. In this first

        the image was compressed and after that encryption algorithm was applied. Then watermark should be applied with the help of additive watermarking technique. In this process the watermark data should be placed in the least significant bit plane of the image.

        1. (b) (c)

    (d)

    Fig.4. (a) original image, (b) compressed image, (c)encrypted image and

    The performance analysis was done by measuring the PSNR values of various images. From this analysis we observe that the RDM has better PSNR value. In the compressed domain SS technique use the non- blind detection method while other two methods use the blind detection method for estimating the watermarked data. In the decompressed domain all the three techniques use the non-blind detection method. The table I shows the PSNR values of all the three methods in different images.

    Table I. PSNR measurements of SS, SCS-QIM

    IMAGES

    CAMERAMAN

    BABOON

    GOLDHILL

    BOAT

    SCHEMES

    1)SPREAD SPECTRUM

    42.1107

    40.4238

    41.4744

    41.6915

    2)SCS-QIM

    47.4697

    45.7847

    46.7699

    47.0027

    3)RDM

    48.1312

    46.444

    47.4582

    47.7478

  4. CONCLUSION

    In this paper we proposed a digital watermarking on JPEG2000 compressed encrypted images. For the watermark embedding we use three watermarking techniques. The additive watermarking technique is

    used here. In this technique we embed the watermark in the least significant bit plane of an image. The watermark in the compressed encrypted domain provides the unauthorized distribution of digital data and also provides security. The RC5 used here is one of the major encryption schemes in cryptography and it also preserves the confidentiality of the content. The security of RC5 is also discussed. We analyze the PSNR values of each scheme and found that RDM provides better PSNR values than other schemes. Thus by analysis, the digital distribution of data becomes easier and it also protect the copyright of the digital content. The application area consists of broadcast monitoring, owner identification, transaction tracking, copy control etc.

    The future scope aims at extending the proposed work to other compression standard like JPEG-LS. JPEG-LS is significantly less complex than JPEG2000. It is reasonable to use JPEG-LS for lossless compression.

  5. REFERENCES

  1. A. Subramanyam, S. Emmanuel, and M. Kankanhalli, Robust watermarking of compressed and encrypted JPEG2000 images, IEEE Trans. on Multimedia, vol.14,no.3, June 2012.

  2. M. Rabbani and R. Joshi, An overview of the JPEG 2000 still image compression standard, Signal Process: Image Commun., vol .17, no.4,pp.469-472. .

  3. R. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, vol. 21, no.2.

  4. Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S Farag Allah, Implementation of RC5 Block Cipher Algorithm for Image Cryptosystems, International Journal of Information and Communication Engineering, 3:8, pp. 537- 542.

  5. S. Hwang, K. Yoon, K. Jun, and K. Lee, Modeling and implementation of digital rights, J. Syst. Softw. , vol. 73, no.3, pp. 533-549, 2004.

  6. F. Hartung, J. Su, and B. Girod, Spread Spectrum watermarking: Malicious attacks and counterattacks, Security and Watermarking of Multimedia Contents, pp. 147-158.

  7. J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Trans. Signal Process., vol. 51, no.4, pp. 1003-1019, Apr.2003

  8. F. Perez-Gonzalez, C. Mosquera, M. Barni, and A. Abrado, Rational dither modulation: A high-rate data-hiding method invariant to gain attacks, IEEE Trans.Signal Process., vol. 53, no. 10, Oct.2005.

  9. B. Schneier, Applied Cryptography. New York: Wiley , 1996.

  10. Omar Elkeelany, Adegoke Olabisi, Performance comparisons, design and implementation of RC5 symmetric encryption core using reconfigurable hardware, Journal of Computers, vol.3, no. 3. Mar.2008.

  11. D. Engel, T. Stutz, and A. Uhl, A survey on JPEG2000 encryption, Multimedia Syst., vol. 15, no. 4, pp. 243-270, 2009.

  12. W. Stallings, Cryptography and Network Security: principles and practices, Prentice- Hall, New Jersey,1999.

Leave a Reply