Client-Side Embedding of Screen-Shooting Resilient Image Watermarking

The proliferation of portable camera devices, represented by smartphones, is increasing the risk of sensitive internal data being leaked by screen shooting. To trace the leak source, a lot of research has been done on screen-shooting resilient watermarking technique, which is capable of extracting t...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE transactions on information forensics and security Ročník 19; s. 5357 - 5372
Hlavní autoři: Xiao, Xiangli, Zhang, Yushu, Hua, Zhongyun, Xia, Zhihua, Weng, Jian
Médium: Journal Article
Jazyk:angličtina
Vydáno: New York IEEE 2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Témata:
ISSN:1556-6013, 1556-6021
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The proliferation of portable camera devices, represented by smartphones, is increasing the risk of sensitive internal data being leaked by screen shooting. To trace the leak source, a lot of research has been done on screen-shooting resilient watermarking technique, which is capable of extracting the previously embedded watermark from the screen-shot image. However, all existing screen-shooting resilient watermarking schemes follow the owner-side embedding mode. In this mode, the management center will suffer heavy computational and communication burden in the case of numerous screens, which hinders the system scalability. As another embedding mode of digital watermarking, client-side embedding can solve the above scalability problem by migrating the watermark embedding operation to the same time when the screen decrypts the image. By designing a pair of image encryption and personalized decryption algorithms based on matrix operation, this paper is the first to realize the client-side embedding of screen-shooting resilient watermarking. In this implementation, challenges are overcome and the following key achievements are attained. First, our scheme embeds watermark using the algorithm of Fang et al. without modification, and thus fully inherits its robustness against screen shooting. Second, the original image is securely encrypted and the watermarked image can be directly retrieved through decryption. Third, the secrecy of the screen watermark is ensured by concealing the embedding pattern. Finally, our scheme is validated by experiments, which shows that the efficiency advantage of client-side embedding is realized while maintaining robustness.
AbstractList The proliferation of portable camera devices, represented by smartphones, is increasing the risk of sensitive internal data being leaked by screen shooting. To trace the leak source, a lot of research has been done on screen-shooting resilient watermarking technique, which is capable of extracting the previously embedded watermark from the screen-shot image. However, all existing screen-shooting resilient watermarking schemes follow the owner-side embedding mode. In this mode, the management center will suffer heavy computational and communication burden in the case of numerous screens, which hinders the system scalability. As another embedding mode of digital watermarking, client-side embedding can solve the above scalability problem by migrating the watermark embedding operation to the same time when the screen decrypts the image. By designing a pair of image encryption and personalized decryption algorithms based on matrix operation, this paper is the first to realize the client-side embedding of screen-shooting resilient watermarking. In this implementation, challenges are overcome and the following key achievements are attained. First, our scheme embeds watermark using the algorithm of Fang et al. without modification, and thus fully inherits its robustness against screen shooting. Second, the original image is securely encrypted and the watermarked image can be directly retrieved through decryption. Third, the secrecy of the screen watermark is ensured by concealing the embedding pattern. Finally, our scheme is validated by experiments, which shows that the efficiency advantage of client-side embedding is realized while maintaining robustness.
Author Xiao, Xiangli
Xia, Zhihua
Hua, Zhongyun
Weng, Jian
Zhang, Yushu
Author_xml – sequence: 1
  givenname: Xiangli
  orcidid: 0000-0002-3250-0603
  surname: Xiao
  fullname: Xiao, Xiangli
  email: xiaoxiangli@nuaa.edu.cn
  organization: College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China
– sequence: 2
  givenname: Yushu
  orcidid: 0000-0001-8183-8435
  surname: Zhang
  fullname: Zhang, Yushu
  email: yushu@nuaa.edu.cn
  organization: College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China
– sequence: 3
  givenname: Zhongyun
  orcidid: 0000-0002-3529-0541
  surname: Hua
  fullname: Hua, Zhongyun
  email: huazhongyun@hit.edu.cn
  organization: School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen Campus, Shenzhen, China
– sequence: 4
  givenname: Zhihua
  orcidid: 0000-0001-6860-647X
  surname: Xia
  fullname: Xia, Zhihua
  email: xia_zhihua@163.com
  organization: College of Cyber Security, Jinan University, Guangzhou, China
– sequence: 5
  givenname: Jian
  orcidid: 0000-0003-4067-8230
  surname: Weng
  fullname: Weng, Jian
  email: cryptjweng@gmail.com
  organization: College of Cyber Security, Jinan University, Guangzhou, China
BookMark eNp9kE9LAzEQxYNUsK1-AMHDguet-d_NUUqrhYJgKx5DNpmtqe2mZtOD395dW0Q8eJph5v1meG-AenWoAaFrgkeEYHW3ms-WI4opHzGmxpizM9QnQshcYkp6Pz1hF2jQNBuMOSey6KPpZOuhTvnSO8imuxKc8_U6C1W2tBGgzpdvIaRu9AyN_9Zm851ZQ_ZqEsSdie_t8hKdV2bbwNWpDtHLbLqaPOaLp4f55H6RW6p4yivCCFeutIoDd4yWmEgnpZBYMcGqalw4gp2jVJnCWsq5tKbkjEorcOV4yYbo9nh3H8PHAZqkN-EQ6_alZliI1lFR8FY1PqpsDE0TodLWJ5N8qFM0fqsJ1l1mustMd5npU2YtSf6Q--hbj5__MjdHxgPAL72gmBHFvgDWnXhs
CODEN ITIFA6
CitedBy_id crossref_primary_10_1109_TIFS_2025_3542992
crossref_primary_10_1109_TCSVT_2024_3448351
crossref_primary_10_1016_j_optlastec_2025_113472
crossref_primary_10_1007_s11042_024_19954_7
crossref_primary_10_1016_j_knosys_2024_112380
crossref_primary_10_1109_LSP_2025_3535216
crossref_primary_10_3390_math13121976
crossref_primary_10_1016_j_optlastec_2025_113217
crossref_primary_10_1109_TDSC_2025_3543416
crossref_primary_10_3390_jimaging11050171
Cites_doi 10.1109/TDSC.2018.2864748
10.1109/TBDATA.2017.2787198
10.1016/j.sigpro.2014.12.026
10.1109/TNSM.2023.3237685
10.1109/TIFS.2008.926988
10.1145/3503161.3548049
10.1109/TIFS.2018.2879301
10.1016/j.sigpro.2022.108791
10.1109/TMM.2019.2907475
10.1109/TNET.2012.2183643
10.1109/TCOMM.2017.2746106
10.1109/ICGEC.2012.107
10.1360/SSI-2021-0213
10.1016/j.jvcir.2016.06.006
10.3390/app10217494
10.1007/978-3-540-73092-7_1
10.1109/TCC.2013.7
10.1016/j.sigpro.2013.11.011
10.1109/ACCESS.2020.3007689
10.1109/TIP.2018.2795745
10.1109/TCSVT.2019.2953720
10.3390/s21030701
10.1109/TBDATA.2017.2679760
10.1109/TIFS.2009.2038761
10.1109/TIP.2020.3036727
10.1109/TDSC.2022.3166134
10.1007/BFb0052339
10.1109/TIFS.2018.2878541
10.1016/j.jvcir.2016.02.003
10.1109/TIFS.2014.2340581
10.1109/TSC.2014.2331694
10.1201/9781351133036
10.1186/s13635-015-0023-y
10.1109/TNET.2015.2394482
10.1109/TrustCom.2011.104
10.1109/TCSVT.2020.3009349
10.1007/978-3-319-14445-0_2
10.1016/j.sigpro.2012.02.002
10.1109/71.246072
10.1109/ICCV.1999.790410
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
DOI 10.1109/TIFS.2024.3397043
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Civil Engineering Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1556-6021
EndPage 5372
ExternalDocumentID 10_1109_TIFS_2024_3397043
10520319
Genre orig-research
GrantInformation_xml – fundername: Postgraduate Research and Practice Innovation Program of Jiangsu Province
  grantid: KYCX23_0397
  funderid: 10.13039/501100010246
– fundername: National Natural Science Foundation of China
  grantid: 62122032; U23B2023
  funderid: 10.13039/501100001809
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
ID FETCH-LOGICAL-c294t-f13149dbc94e4d32b016d665609353ff78d10dd229a8cc2446cab4326c50fd4b3
IEDL.DBID RIE
ISICitedReferencesCount 14
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001224202900009&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1556-6013
IngestDate Sun Nov 09 08:10:38 EST 2025
Sat Nov 29 02:51:35 EST 2025
Tue Nov 18 22:34:16 EST 2025
Wed Aug 27 02:02:19 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c294t-f13149dbc94e4d32b016d665609353ff78d10dd229a8cc2446cab4326c50fd4b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-4067-8230
0000-0002-3529-0541
0000-0002-3250-0603
0000-0001-8183-8435
0000-0001-6860-647X
PQID 3055168884
PQPubID 85506
PageCount 16
ParticipantIDs crossref_citationtrail_10_1109_TIFS_2024_3397043
ieee_primary_10520319
crossref_primary_10_1109_TIFS_2024_3397043
proquest_journals_3055168884
PublicationCentury 2000
PublicationDate 20240000
2024-00-00
20240101
PublicationDateYYYYMMDD 2024-01-01
PublicationDate_xml – year: 2024
  text: 20240000
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2024
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref35
ref12
ref34
ref15
ref37
ref14
ref36
ref31
ref30
ref11
ref33
Cheng (ref4)
ref10
ref32
ref2
ref1
ref17
ref39
ref16
ref38
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref41
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref3
ref6
ref5
ref40
References_xml – ident: ref10
  doi: 10.1109/TDSC.2018.2864748
– ident: ref41
  doi: 10.1109/TBDATA.2017.2787198
– ident: ref33
  doi: 10.1016/j.sigpro.2014.12.026
– ident: ref28
  doi: 10.1109/TNSM.2023.3237685
– ident: ref14
  doi: 10.1109/TIFS.2008.926988
– ident: ref22
  doi: 10.1145/3503161.3548049
– ident: ref35
  doi: 10.1109/TIFS.2018.2879301
– ident: ref7
  doi: 10.1016/j.sigpro.2022.108791
– ident: ref9
  doi: 10.1109/TMM.2019.2907475
– ident: ref19
  doi: 10.1109/TNET.2012.2183643
– start-page: 2969
  volume-title: Proc. 30th USENIX Secur. Symp.
  ident: ref4
  article-title: mID: Tracing screen photos via Moiré patterns
– ident: ref21
  doi: 10.1109/TCOMM.2017.2746106
– ident: ref29
  doi: 10.1109/ICGEC.2012.107
– ident: ref24
  doi: 10.1360/SSI-2021-0213
– ident: ref32
  doi: 10.1016/j.jvcir.2016.06.006
– ident: ref2
  doi: 10.3390/app10217494
– ident: ref13
  doi: 10.1007/978-3-540-73092-7_1
– ident: ref38
  doi: 10.1109/TCC.2013.7
– ident: ref31
  doi: 10.1016/j.sigpro.2013.11.011
– ident: ref3
  doi: 10.1109/ACCESS.2020.3007689
– ident: ref8
  doi: 10.1109/TIP.2018.2795745
– ident: ref6
  doi: 10.1109/TCSVT.2019.2953720
– ident: ref23
  doi: 10.3390/s21030701
– ident: ref40
  doi: 10.1109/TBDATA.2017.2679760
– ident: ref15
  doi: 10.1109/TIFS.2009.2038761
– ident: ref11
  doi: 10.1109/TIP.2020.3036727
– ident: ref12
  doi: 10.1109/TDSC.2022.3166134
– ident: ref25
  doi: 10.1007/BFb0052339
– ident: ref1
  doi: 10.1109/TIFS.2018.2878541
– ident: ref34
  doi: 10.1016/j.jvcir.2016.02.003
– ident: ref16
  doi: 10.1109/TIFS.2014.2340581
– ident: ref39
  doi: 10.1109/TSC.2014.2331694
– ident: ref37
  doi: 10.1201/9781351133036
– ident: ref17
  doi: 10.1186/s13635-015-0023-y
– ident: ref20
  doi: 10.1109/TNET.2015.2394482
– ident: ref26
  doi: 10.1109/TrustCom.2011.104
– ident: ref5
  doi: 10.1109/TCSVT.2020.3009349
– ident: ref27
  doi: 10.1007/978-3-319-14445-0_2
– ident: ref30
  doi: 10.1016/j.sigpro.2012.02.002
– ident: ref18
  doi: 10.1109/71.246072
– ident: ref36
  doi: 10.1109/ICCV.1999.790410
SSID ssj0044168
Score 2.4588366
Snippet The proliferation of portable camera devices, represented by smartphones, is increasing the risk of sensitive internal data being leaked by screen shooting. To...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 5357
SubjectTerms Algorithms
Cryptography
Digital watermarking
Distortion
Embedding
Encryption
leak tracing
Media
Portable equipment
Robustness
Scalability
screen-shooting leakage
Watermarking
Title Client-Side Embedding of Screen-Shooting Resilient Image Watermarking
URI https://ieeexplore.ieee.org/document/10520319
https://www.proquest.com/docview/3055168884
Volume 19
WOSCitedRecordID wos001224202900009&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1556-6021
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0044168
  issn: 1556-6013
  databaseCode: RIE
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlR3LSsNAcLDFgx6s1orVKjl4Eram-0iyRykt9lLEVuwtZF9YqI304fe7u0mkIgrecphZwszOc-cBcEMpZYIQhjhRGaK8ZxBnoUJWYWY6sy6yVtQvm4jH42Q2449ls7rvhdFa--Iz3XWf_i1f5XLrUmVWwhl2XTc1qMVxVDRrVWrXmvWi742xCNkog5RPmL2Q301Hw4kNBTHtEmt-Q0q-GSG_VeWHKvb2Zdj4558dw1HpSAb3BedPYE8vm9ColjQEpcw24XBn4uApDPoL1wCJJnOlg8Gb0MrZriA3FsFV4KDJa567SujgSa_nHjYYvVmdE7xkXon71HoLnoeDaf8BlZsUkMScbpDpERsJKSE51VQRLKyjpyI3d4cTRoyJE9ULlcKYZ4mU1uJHMhPUenaShUZRQc6gvsyX-hyCCBvsZrhH3DBqnTWRSGKyOE6EUSYmqg1hRdpUlmPG3baLRerDjZCnjhup40ZacqMNt18o78WMjb-AW478O4AF5dvQqRiYlmK4Tt04M3stkoRe_IJ2CQfu9CKp0oH6ZrXVV7AvPzbz9era37BPAArLdg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlR3ZSsNAcNAqqA_Wo2I98-CTsJrukWQfRVparEVsRd9CsgcW2kZ6-P3ubraiiIJvIcyQMLNz7hwAF5RSlhPCECcyQ5Q3NOIslMgozExlxkVWkrplE3Gvl7y88AffrO56YZRSrvhMXdlHd5cvC7GwqTIj4QzbrptVWLOrs3y71lLxmjdl5xtjETJxBvGXmI2QXw86rb4JBjG9IsYAh5R8M0Nur8oPZewsTKv6z3_bgW3vSgY3Je93YUVN9qC6XNMQeKndg60vMwf3oXk7si2QqD-UKmiOcyWt9QoKbRBsDQ7qvxaFrYUOHtVs6GCDzthoneA5c2rcJddr8NRqDm7byO9SQAJzOke6QUwsJHPBqaKS4Ny4ejKyk3c4YUTrOJGNUEqMeZYIYWx-JLKcGt9OsFBLmpMDqEyKiTqEIMIa2ynuEdeMGnctTwTRWRwnuZY6JrIO4ZK0qfCDxu2-i1HqAo6Qp5YbqeVG6rlRh8tPlLdyysZfwDVL_i-AJeXrcLJkYOoFcZbagWbmWCQJPfoF7Rw22oP7btrt9O6OYdN-qUyxnEBlPl2oU1gX7_PhbHrmTtsHxp3Ovw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Client-Side+Embedding+of+Screen-Shooting+Resilient+Image+Watermarking&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Xiao%2C+Xiangli&rft.au=Zhang%2C+Yushu&rft.au=Hua%2C+Zhongyun&rft.au=Xia%2C+Zhihua&rft.date=2024&rft.pub=IEEE&rft.issn=1556-6013&rft.volume=19&rft.spage=5357&rft.epage=5372&rft_id=info:doi/10.1109%2FTIFS.2024.3397043&rft.externalDocID=10520319
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon