Client-Side Embedding of Screen-Shooting Resilient Image Watermarking
The proliferation of portable camera devices, represented by smartphones, is increasing the risk of sensitive internal data being leaked by screen shooting. To trace the leak source, a lot of research has been done on screen-shooting resilient watermarking technique, which is capable of extracting t...
Uloženo v:
| Vydáno v: | IEEE transactions on information forensics and security Ročník 19; s. 5357 - 5372 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York
IEEE
2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Témata: | |
| ISSN: | 1556-6013, 1556-6021 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The proliferation of portable camera devices, represented by smartphones, is increasing the risk of sensitive internal data being leaked by screen shooting. To trace the leak source, a lot of research has been done on screen-shooting resilient watermarking technique, which is capable of extracting the previously embedded watermark from the screen-shot image. However, all existing screen-shooting resilient watermarking schemes follow the owner-side embedding mode. In this mode, the management center will suffer heavy computational and communication burden in the case of numerous screens, which hinders the system scalability. As another embedding mode of digital watermarking, client-side embedding can solve the above scalability problem by migrating the watermark embedding operation to the same time when the screen decrypts the image. By designing a pair of image encryption and personalized decryption algorithms based on matrix operation, this paper is the first to realize the client-side embedding of screen-shooting resilient watermarking. In this implementation, challenges are overcome and the following key achievements are attained. First, our scheme embeds watermark using the algorithm of Fang et al. without modification, and thus fully inherits its robustness against screen shooting. Second, the original image is securely encrypted and the watermarked image can be directly retrieved through decryption. Third, the secrecy of the screen watermark is ensured by concealing the embedding pattern. Finally, our scheme is validated by experiments, which shows that the efficiency advantage of client-side embedding is realized while maintaining robustness. |
|---|---|
| AbstractList | The proliferation of portable camera devices, represented by smartphones, is increasing the risk of sensitive internal data being leaked by screen shooting. To trace the leak source, a lot of research has been done on screen-shooting resilient watermarking technique, which is capable of extracting the previously embedded watermark from the screen-shot image. However, all existing screen-shooting resilient watermarking schemes follow the owner-side embedding mode. In this mode, the management center will suffer heavy computational and communication burden in the case of numerous screens, which hinders the system scalability. As another embedding mode of digital watermarking, client-side embedding can solve the above scalability problem by migrating the watermark embedding operation to the same time when the screen decrypts the image. By designing a pair of image encryption and personalized decryption algorithms based on matrix operation, this paper is the first to realize the client-side embedding of screen-shooting resilient watermarking. In this implementation, challenges are overcome and the following key achievements are attained. First, our scheme embeds watermark using the algorithm of Fang et al. without modification, and thus fully inherits its robustness against screen shooting. Second, the original image is securely encrypted and the watermarked image can be directly retrieved through decryption. Third, the secrecy of the screen watermark is ensured by concealing the embedding pattern. Finally, our scheme is validated by experiments, which shows that the efficiency advantage of client-side embedding is realized while maintaining robustness. |
| Author | Xiao, Xiangli Xia, Zhihua Hua, Zhongyun Weng, Jian Zhang, Yushu |
| Author_xml | – sequence: 1 givenname: Xiangli orcidid: 0000-0002-3250-0603 surname: Xiao fullname: Xiao, Xiangli email: xiaoxiangli@nuaa.edu.cn organization: College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China – sequence: 2 givenname: Yushu orcidid: 0000-0001-8183-8435 surname: Zhang fullname: Zhang, Yushu email: yushu@nuaa.edu.cn organization: College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China – sequence: 3 givenname: Zhongyun orcidid: 0000-0002-3529-0541 surname: Hua fullname: Hua, Zhongyun email: huazhongyun@hit.edu.cn organization: School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen Campus, Shenzhen, China – sequence: 4 givenname: Zhihua orcidid: 0000-0001-6860-647X surname: Xia fullname: Xia, Zhihua email: xia_zhihua@163.com organization: College of Cyber Security, Jinan University, Guangzhou, China – sequence: 5 givenname: Jian orcidid: 0000-0003-4067-8230 surname: Weng fullname: Weng, Jian email: cryptjweng@gmail.com organization: College of Cyber Security, Jinan University, Guangzhou, China |
| BookMark | eNp9kE9LAzEQxYNUsK1-AMHDguet-d_NUUqrhYJgKx5DNpmtqe2mZtOD395dW0Q8eJph5v1meG-AenWoAaFrgkeEYHW3ms-WI4opHzGmxpizM9QnQshcYkp6Pz1hF2jQNBuMOSey6KPpZOuhTvnSO8imuxKc8_U6C1W2tBGgzpdvIaRu9AyN_9Zm851ZQ_ZqEsSdie_t8hKdV2bbwNWpDtHLbLqaPOaLp4f55H6RW6p4yivCCFeutIoDd4yWmEgnpZBYMcGqalw4gp2jVJnCWsq5tKbkjEorcOV4yYbo9nh3H8PHAZqkN-EQ6_alZliI1lFR8FY1PqpsDE0TodLWJ5N8qFM0fqsJ1l1mustMd5npU2YtSf6Q--hbj5__MjdHxgPAL72gmBHFvgDWnXhs |
| CODEN | ITIFA6 |
| CitedBy_id | crossref_primary_10_1109_TIFS_2025_3542992 crossref_primary_10_1109_TCSVT_2024_3448351 crossref_primary_10_1016_j_optlastec_2025_113472 crossref_primary_10_1007_s11042_024_19954_7 crossref_primary_10_1016_j_knosys_2024_112380 crossref_primary_10_1109_LSP_2025_3535216 crossref_primary_10_3390_math13121976 crossref_primary_10_1016_j_optlastec_2025_113217 crossref_primary_10_1109_TDSC_2025_3543416 crossref_primary_10_3390_jimaging11050171 |
| Cites_doi | 10.1109/TDSC.2018.2864748 10.1109/TBDATA.2017.2787198 10.1016/j.sigpro.2014.12.026 10.1109/TNSM.2023.3237685 10.1109/TIFS.2008.926988 10.1145/3503161.3548049 10.1109/TIFS.2018.2879301 10.1016/j.sigpro.2022.108791 10.1109/TMM.2019.2907475 10.1109/TNET.2012.2183643 10.1109/TCOMM.2017.2746106 10.1109/ICGEC.2012.107 10.1360/SSI-2021-0213 10.1016/j.jvcir.2016.06.006 10.3390/app10217494 10.1007/978-3-540-73092-7_1 10.1109/TCC.2013.7 10.1016/j.sigpro.2013.11.011 10.1109/ACCESS.2020.3007689 10.1109/TIP.2018.2795745 10.1109/TCSVT.2019.2953720 10.3390/s21030701 10.1109/TBDATA.2017.2679760 10.1109/TIFS.2009.2038761 10.1109/TIP.2020.3036727 10.1109/TDSC.2022.3166134 10.1007/BFb0052339 10.1109/TIFS.2018.2878541 10.1016/j.jvcir.2016.02.003 10.1109/TIFS.2014.2340581 10.1109/TSC.2014.2331694 10.1201/9781351133036 10.1186/s13635-015-0023-y 10.1109/TNET.2015.2394482 10.1109/TrustCom.2011.104 10.1109/TCSVT.2020.3009349 10.1007/978-3-319-14445-0_2 10.1016/j.sigpro.2012.02.002 10.1109/71.246072 10.1109/ICCV.1999.790410 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
| DOI | 10.1109/TIFS.2024.3397043 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Civil Engineering Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1556-6021 |
| EndPage | 5372 |
| ExternalDocumentID | 10_1109_TIFS_2024_3397043 10520319 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Postgraduate Research and Practice Innovation Program of Jiangsu Province grantid: KYCX23_0397 funderid: 10.13039/501100010246 – fundername: National Natural Science Foundation of China grantid: 62122032; U23B2023 funderid: 10.13039/501100001809 |
| GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
| ID | FETCH-LOGICAL-c294t-f13149dbc94e4d32b016d665609353ff78d10dd229a8cc2446cab4326c50fd4b3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 14 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001224202900009&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1556-6013 |
| IngestDate | Sun Nov 09 08:10:38 EST 2025 Sat Nov 29 02:51:35 EST 2025 Tue Nov 18 22:34:16 EST 2025 Wed Aug 27 02:02:19 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c294t-f13149dbc94e4d32b016d665609353ff78d10dd229a8cc2446cab4326c50fd4b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-4067-8230 0000-0002-3529-0541 0000-0002-3250-0603 0000-0001-8183-8435 0000-0001-6860-647X |
| PQID | 3055168884 |
| PQPubID | 85506 |
| PageCount | 16 |
| ParticipantIDs | crossref_citationtrail_10_1109_TIFS_2024_3397043 ieee_primary_10520319 crossref_primary_10_1109_TIFS_2024_3397043 proquest_journals_3055168884 |
| PublicationCentury | 2000 |
| PublicationDate | 20240000 2024-00-00 20240101 |
| PublicationDateYYYYMMDD | 2024-01-01 |
| PublicationDate_xml | – year: 2024 text: 20240000 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on information forensics and security |
| PublicationTitleAbbrev | TIFS |
| PublicationYear | 2024 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 ref31 ref30 ref11 ref33 Cheng (ref4) ref10 ref32 ref2 ref1 ref17 ref39 ref16 ref38 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref41 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref3 ref6 ref5 ref40 |
| References_xml | – ident: ref10 doi: 10.1109/TDSC.2018.2864748 – ident: ref41 doi: 10.1109/TBDATA.2017.2787198 – ident: ref33 doi: 10.1016/j.sigpro.2014.12.026 – ident: ref28 doi: 10.1109/TNSM.2023.3237685 – ident: ref14 doi: 10.1109/TIFS.2008.926988 – ident: ref22 doi: 10.1145/3503161.3548049 – ident: ref35 doi: 10.1109/TIFS.2018.2879301 – ident: ref7 doi: 10.1016/j.sigpro.2022.108791 – ident: ref9 doi: 10.1109/TMM.2019.2907475 – ident: ref19 doi: 10.1109/TNET.2012.2183643 – start-page: 2969 volume-title: Proc. 30th USENIX Secur. Symp. ident: ref4 article-title: mID: Tracing screen photos via Moiré patterns – ident: ref21 doi: 10.1109/TCOMM.2017.2746106 – ident: ref29 doi: 10.1109/ICGEC.2012.107 – ident: ref24 doi: 10.1360/SSI-2021-0213 – ident: ref32 doi: 10.1016/j.jvcir.2016.06.006 – ident: ref2 doi: 10.3390/app10217494 – ident: ref13 doi: 10.1007/978-3-540-73092-7_1 – ident: ref38 doi: 10.1109/TCC.2013.7 – ident: ref31 doi: 10.1016/j.sigpro.2013.11.011 – ident: ref3 doi: 10.1109/ACCESS.2020.3007689 – ident: ref8 doi: 10.1109/TIP.2018.2795745 – ident: ref6 doi: 10.1109/TCSVT.2019.2953720 – ident: ref23 doi: 10.3390/s21030701 – ident: ref40 doi: 10.1109/TBDATA.2017.2679760 – ident: ref15 doi: 10.1109/TIFS.2009.2038761 – ident: ref11 doi: 10.1109/TIP.2020.3036727 – ident: ref12 doi: 10.1109/TDSC.2022.3166134 – ident: ref25 doi: 10.1007/BFb0052339 – ident: ref1 doi: 10.1109/TIFS.2018.2878541 – ident: ref34 doi: 10.1016/j.jvcir.2016.02.003 – ident: ref16 doi: 10.1109/TIFS.2014.2340581 – ident: ref39 doi: 10.1109/TSC.2014.2331694 – ident: ref37 doi: 10.1201/9781351133036 – ident: ref17 doi: 10.1186/s13635-015-0023-y – ident: ref20 doi: 10.1109/TNET.2015.2394482 – ident: ref26 doi: 10.1109/TrustCom.2011.104 – ident: ref5 doi: 10.1109/TCSVT.2020.3009349 – ident: ref27 doi: 10.1007/978-3-319-14445-0_2 – ident: ref30 doi: 10.1016/j.sigpro.2012.02.002 – ident: ref18 doi: 10.1109/71.246072 – ident: ref36 doi: 10.1109/ICCV.1999.790410 |
| SSID | ssj0044168 |
| Score | 2.4588366 |
| Snippet | The proliferation of portable camera devices, represented by smartphones, is increasing the risk of sensitive internal data being leaked by screen shooting. To... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 5357 |
| SubjectTerms | Algorithms Cryptography Digital watermarking Distortion Embedding Encryption leak tracing Media Portable equipment Robustness Scalability screen-shooting leakage Watermarking |
| Title | Client-Side Embedding of Screen-Shooting Resilient Image Watermarking |
| URI | https://ieeexplore.ieee.org/document/10520319 https://www.proquest.com/docview/3055168884 |
| Volume | 19 |
| WOSCitedRecordID | wos001224202900009&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1556-6021 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0044168 issn: 1556-6013 databaseCode: RIE dateStart: 20060101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlR3LSsNAcLDFgx6s1orVKjl4Eram-0iyRykt9lLEVuwtZF9YqI304fe7u0mkIgrecphZwszOc-cBcEMpZYIQhjhRGaK8ZxBnoUJWYWY6sy6yVtQvm4jH42Q2449ls7rvhdFa--Iz3XWf_i1f5XLrUmVWwhl2XTc1qMVxVDRrVWrXmvWi742xCNkog5RPmL2Q301Hw4kNBTHtEmt-Q0q-GSG_VeWHKvb2Zdj4558dw1HpSAb3BedPYE8vm9ColjQEpcw24XBn4uApDPoL1wCJJnOlg8Gb0MrZriA3FsFV4KDJa567SujgSa_nHjYYvVmdE7xkXon71HoLnoeDaf8BlZsUkMScbpDpERsJKSE51VQRLKyjpyI3d4cTRoyJE9ULlcKYZ4mU1uJHMhPUenaShUZRQc6gvsyX-hyCCBvsZrhH3DBqnTWRSGKyOE6EUSYmqg1hRdpUlmPG3baLRerDjZCnjhup40ZacqMNt18o78WMjb-AW478O4AF5dvQqRiYlmK4Tt04M3stkoRe_IJ2CQfu9CKp0oH6ZrXVV7AvPzbz9era37BPAArLdg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlR3ZSsNAcNAqqA_Wo2I98-CTsJrukWQfRVparEVsRd9CsgcW2kZ6-P3ubraiiIJvIcyQMLNz7hwAF5RSlhPCECcyQ5Q3NOIslMgozExlxkVWkrplE3Gvl7y88AffrO56YZRSrvhMXdlHd5cvC7GwqTIj4QzbrptVWLOrs3y71lLxmjdl5xtjETJxBvGXmI2QXw86rb4JBjG9IsYAh5R8M0Nur8oPZewsTKv6z3_bgW3vSgY3Je93YUVN9qC6XNMQeKndg60vMwf3oXk7si2QqD-UKmiOcyWt9QoKbRBsDQ7qvxaFrYUOHtVs6GCDzthoneA5c2rcJddr8NRqDm7byO9SQAJzOke6QUwsJHPBqaKS4Ny4ejKyk3c4YUTrOJGNUEqMeZYIYWx-JLKcGt9OsFBLmpMDqEyKiTqEIMIa2ynuEdeMGnctTwTRWRwnuZY6JrIO4ZK0qfCDxu2-i1HqAo6Qp5YbqeVG6rlRh8tPlLdyysZfwDVL_i-AJeXrcLJkYOoFcZbagWbmWCQJPfoF7Rw22oP7btrt9O6OYdN-qUyxnEBlPl2oU1gX7_PhbHrmTtsHxp3Ovw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Client-Side+Embedding+of+Screen-Shooting+Resilient+Image+Watermarking&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Xiao%2C+Xiangli&rft.au=Zhang%2C+Yushu&rft.au=Hua%2C+Zhongyun&rft.au=Xia%2C+Zhihua&rft.date=2024&rft.pub=IEEE&rft.issn=1556-6013&rft.volume=19&rft.spage=5357&rft.epage=5372&rft_id=info:doi/10.1109%2FTIFS.2024.3397043&rft.externalDocID=10520319 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |