PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for graytone images but can easily be adopted for color ones. For the encryption purpose, the algorithm uses the rotation of data vectors presented as quaternions in a three-dimensional space around another quaternion (key). On the receiver's side, a small amount of unnoticeable by human eye errors occurs in the decrypted images. These errors are used as a user's digital figerprint for the purpose of traitor tracing in case of copyright violation. A computer-based simulation was performed to scrutinize the potential presented quaternion encryption scheme for the implementation of digital fingerprinting. The obtained results are shown at the end of this paper.
Słowa kluczowe
Rocznik
Tom
Strony
3--11
Opis fizyczny
Bibliogr. 23 poz., rys., tab.
Twórcy
  • Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology, Gdańsk, Poland
  • Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology, Gdańsk, Poland
  • Department of Radiological Informatics and Statistics, Medical University of Gdańsk, Gdańsk, Poland
  • Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology, Gdańsk, Poland
Bibliografia
  • [1] T. Nagase, M. Komata, and T. Araki, "Secure signals transmission based on quaternion encryption scheme" in Proc. 18th In. Conf. Adv. Inform. Netw. Appl. AINA 2004, Fukuoka, Japan, 2004, vol. 2, pp. 35-38.
  • [2] T. Nagase, R. Koide, T. Araki, Y. Hasegawa, "A new Quadripartite Public-Key Cryptosystem", in Proc. Int. Symp. Commun. lnfom. Technol. ISCIT 2004, Sapporo, Japan, 2004, pp. 7479.
  • [3] R. Goldman, "Understanding quaternions", Graphical Models, vol. 73, no. 2, pp. 21-49, 2011.
  • [4] R. Goldman, "An Integrated Introduction to Computer Graphics and Geometric Modeling". New York: CRC Press, 2009.
  • [5] M. Dzwonkowski, "Software implementation and research of quaternion cryptosystem", Master thesis, Faculty of ETI, Gdańsk University of Technology, Gdańsk, 2011, pp. 5-84.
  • [6] M. Dzwonkowski and R. Rykaczewski, "A New Quaternion Encryption Scheme for Image Transmission", in Proc. ICT Young 2012 Conference, Gdańsk, Poland, 2012, pp. 21-27.
  • [7] M. Dzwonkowski and R. Rykaczewski, "Quaternion encryption method for image and video transmission", Telecom. Overv. + Telecom. News, vol. 8-9, pp. 1216-1220, 2013.
  • [8] F. Zhang, "Quaternion and matrices of quaternions", Linear Algebra and its Applications, vol. 251, pp. 21-57, 1997.
  • [9] W. Kahan, "IEEE Standard 754 for Binary Floating-Point Arithmetic", pp. 1-30, 1997.
  • [10] K. J. R. Liu, W. Trappe, Z. J. Wang, M. Wu, and H. Zhao, Multimedia Fingerprinting Forensics For Traitor Tracing. EURASIP Book Ser. on Signal Process. and Commun., Hindawi Publishing Corporation, vol. 4, 2005.
  • [11] K. J. R. Liu and H. Zhao, "Bandwidth efficient fingerprint multicast for video streaming", in Proc. IEEE Int. Conf. Acoust. Speech and Sig. Process. ICASSP '04, Montreal, Canada, 2004, vol. 5, pp. 849-852.
  • [12] D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management", Proc. IEEE, vol. 92, no. 6, pp. 918{932, 2004.
  • [13] M. Ammar and P. Judge, "WHIM: Watermarking multicast video with a hierarchy of intermediaries", in Proc. 10th Int. Worksh. Netw. Operat. Sys. Supp. Digi. Audio Video NOSSDAV 2000, Chapel Hill, USA, 2000.
  • [14] R. Parviainen and R. Parnes, "Large scale distributed watermarking of multicast media through encryption", in Proc. IFIP Int. Conf. Commun. Multimed. Secur. Issues of the New Century, Darmstadt, Germany, 2001, p. 17.
  • [15] I.J . Cox, J. Kilian, F. T. Leighton, and T. G. Shamoon, "Secure spread spectrum watermarking for multimedia", IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, 1997.
  • [16] R. Anderson and C. Manifavas, "Chameleon - A new kind of stream cipher", Lecture Notes in Computer Science, Fast Softw. Encryption, E. Biham. Ed, Heidelberg: Springer, 1997, pp. 107-113.
  • [17] R. Rykaczewski, "Hillcast - A method of joint decryption and fingerprinting for multicast distribution of multimedia data". Scientific J. WETI PG, vol. 19, pp. 231-236, 2010
  • [18] B. Czaplewski and R. Rykaczewski, "Improvement of fingerprinting ethod based on Hill Cipher by using frequency domain", in Proc. ICT Young 2012 Conf., Gdansk, Poland, 2012.
  • [19] B. Czaplewski and K. Czaplewski, "Protection of visual data transmission for vessel traffic systems using joint fingerprinting and decryption method based on modified Hill cipher", Annual of Navigation, vol. 19, no. 2, pp. 5{17, 2012.
  • [20] K. J. R. Liu, Z. J. Wang, M. Wu, and H. Zhao, "Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting", IEEE Trans. Image Process., vol. 14, no. 5, pp. 646-661, 2005.
  • [21] K. J. R. Liu, W. Trappe, Z. J.Wang, and M. Wu, "Collusion-resistant fingerprinting for multimedia", IEEE Sig, Process. Mag., vol. 21, pp. 15-27, 2004.
  • [22] S. He and M. Wu, "Joint coding and embedding techniques for multimedia fingerprinting", IEEE Trans. Inf. Forensics and Secur., vol. 1, no. 2, pp. 231-247, 2006.
  • [23] W. Krysicki, J. Bartos, W. Dyczka, K. Królikowska, and M. Wasilewska, Probability and Mathematical Statistics in Exercises, part II, IV ed., Warszawa: PWN, 1999, pp. 49-54.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-22c27a98-5663-45cb-8770-3f9741f9ff00
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.