Top Banner
Security & Mojette Florent Autrusseau Collaborations Co-authors Publications Projects Security topics Watermarking & encryption Works within the IRCCyN lab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette Security & Mojette Florent Autrusseau IRCCyN-IVC Polytech’Nantes, University of Nantes Mojette Day, 4 Feb. 2015 1 / 28
31

Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Mar 11, 2018

Download

Documents

lykhanh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Encryption, Watermarking and MojetteSecurity & Mojette

Florent Autrusseau

IRCCyN-IVCPolytech’Nantes, University of Nantes

Mojette Day, 4 Feb. 2015

1 / 28

Page 2: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Outline

1 CollaborationsCo-authorsPublicationsProjects

2 Security topicsWatermarking & encryption

3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding

4 Conclusion

2 / 28

Page 3: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Outline

1 CollaborationsCo-authorsPublicationsProjects

2 Security topicsWatermarking & encryption

3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding

4 Conclusion

3 / 28

Page 4: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Co-authors.• Jeanpierre Guédon (IRCCyN)• Andrew Kingston (IRCCyN-Univ. Canberra)• Benoit Parrein (IRCCyN)• Myriam Servières (IRCCyN-Cerma)• Junyu Dong (Ocean Univ. China)• Thierry Hamon(IRCCyN-)• Vincent Ricordel (IRCCyN)• Pierre Verbert (IRCCyN)• Pierre Evenou (IRCCyN-Fizians)• Yves Bizais (CHU-Brest-)• Nicolas Normand (IRCCyN)• Patrizio Campisi (Uni Roma 3)• Simone Colosimo (Uni Roma 3-)• Eric Grall (Thales-)

• ...

4 / 28

Page 5: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Outline

1 CollaborationsCo-authorsPublicationsProjects

2 Security topicsWatermarking & encryption

3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding

4 Conclusion

5 / 28

Page 6: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Publications (Security).• C. Zhang, J. Dong, J. Li, F. Autrusseau, "A New Information Hiding Method for Image

Watermarking Based on Mojette Transform", ISNNS, 2010• A. Kingston, F. Autrusseau, E. Grall, T. Hamon, B. Parrein, "Mojette based security"

(chap 10) The Mojette transform: Theory and Applications,wiley, 2009• A. Kingston, S. Colosimo, P. Campisi, F. Autrusseau, "Lossless Image Compression and

Selective Encryption Using a Discrete Radon Transform", IEEE-ICIP 2007• F. Autrusseau, P. Evenou, T. Hamon, "Secure Distributed Storage based on the

Mojette transform", Notere 2006• F. Autrusseau, JP. Guédon, "Chiffrement Mojette d’images médicales", ISI, Lavoisier,

2003• F. Autrusseau, JP. Guédon, Y. Bizais, "Watermarking and cryptographic schemes for

medical imaging", SPIE Medical Imaging, 2003• F. Autrusseau, JP. Guédon, "A joint multiple description-encryption image algorithm",

ICIP 2003• F. Autrusseau, JP. Guédon, "Perceptual image watermarking using a secure Mojette

transmission scheme", COST 276, 2003• F. Autrusseau, JP. Guédon, "Image Watermarking in the Fourier Domain Using the

Mojette Transform", IEEE-DSP, 2002• F. Autrusseau, JP. Guédon, "Image watermarking for copyright protection and data

hiding via the Mojette transform", SPIE 2002• F. Autrusseau, "Modélisation Psychovisuelle pour le tatouage des images", Signal and

Image processing. Ph. D. Thesis, Université de Nantes, 2002. in French• JP. Guédon, N. Normand, P. Verbert, B. Parrein, F. Autrusseau, "Load-balancing and

scalable multimedia distribution using the Mojette transform", ITCOM, 2001

6 / 28

Page 7: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Outline

1 CollaborationsCo-authorsPublicationsProjects

2 Security topicsWatermarking & encryption

3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding

4 Conclusion

7 / 28

Page 8: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Funded Projects.

Research Projects

• ANR-ARA/SSIA - “Transfert Sécurisé d’images d’artHaute Résolution” (TSAR) - (2005-2008)

• Funding from Région Pays de la Loire, postdoctoralposition (Andrew Kingston) (2007-2008)

• OSEO/Région Project - Miles (2006-2009)

Partners

• IRCCyN, IETR, LIRMM, GIPSA-Lab, C2RMF, LINA,IREENA, LERIA, LUIM, LISA, IMN-PCM, LGMPA,LAUM, LSO, UCO2M.

8 / 28

Page 9: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Outline

1 CollaborationsCo-authorsPublicationsProjects

2 Security topicsWatermarking & encryption

3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding

4 Conclusion

9 / 28

Page 10: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Topics.

Mojette-based security

• Watermarking• Encryption• Shared secret

Encryption

• Encryption+watermarking• Encryption+coding

10 / 28

Page 11: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Watermarking - goals.Protection de copyright

• Embed an invisible copyright within images• Robustness against attacks

Steganography

• Transmit secret data• Invisible and statistically not detectable

Fingerprinting

• Embed a fragile watermark• Check Authenticity• Traitor tracing

11 / 28

Page 12: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Watermarking - goals.Protection de copyright

• Embed an invisible copyright within images• Robustness against attacks

Steganography

• Transmit secret data• Invisible and statistically not detectable

Fingerprinting

• Embed a fragile watermark• Check Authenticity• Traitor tracing

11 / 28

Page 13: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Watermarking - goals.Protection de copyright

• Embed an invisible copyright within images• Robustness against attacks

Steganography

• Transmit secret data• Invisible and statistically not detectable

Fingerprinting

• Embed a fragile watermark• Check Authenticity• Traitor tracing

11 / 28

Page 14: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Outline

1 CollaborationsCo-authorsPublicationsProjects

2 Security topicsWatermarking & encryption

3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding

4 Conclusion

12 / 28

Page 15: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Mojette-based watermarking.

Embed ghosts

• Embed Mojette ghosts onto the image’s LSB planes.• Transmit Mojette projections for which the ghost isinvisible.

• Transmit other projections as a detection key.

• F. Autrusseau, JP. Guedon, “Image watermarking for copyright protection and datahiding via the Mojette transform”, SPIE Electronic Imaging, Security and Watermarkingof Multimedia Contents IV, vol. 4675, pp. 378-386, San Jose, CA, January 2002.

• F. Autrusseau, JP. Guedon, “Image Watermarking in the Fourier Domain Using theMojette Transform”, 14th IEEE International Conference on Digital Signal Processing(DSP2002), vol. II, pp. 725-728, Santorini Greece, July 2002.

13 / 28

Page 16: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Mojette-based watermarking.Embed a Mojette ghost within the Fourier spectrum.

(a) Original Image (b) Marked Image (c) Spatial watermark

(d) Original Spectrum (e) Marked spectrum (f) Watermark inFourier space

Figure : Watermarking

14 / 28

Page 17: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Mojette-based watermarking.The Mojette transform is used for the detection...

(a) Proj. of the Original spectrum (b) Proj. of the ghost

(c) Proj. of the marked spectrum (d) Proj. marked & attackedspectrum

Figure : Watermark Detection 15 / 28

Page 18: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Outline

1 CollaborationsCo-authorsPublicationsProjects

2 Security topicsWatermarking & encryption

3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding

4 Conclusion

16 / 28

Page 19: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Mojette encryption.We can take benefit from the inverse Mojette

instability... (erroneous projections backprojection)

(a) One singlemodified bin.

(b) One singlemodified bin.

(c) Noise additiononto one proj.

(d) Noise additiononto one proj.(mod256).

Figure : Erroneous back-projection17 / 28

Page 20: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Mojette encryption.

Use a reconstruction path

• We keep track of the 1 to 1 (bin to pixel)correspondences during the direct MT.

• Store a unique path.• Encrypt unused bins.• → The original data is mixed with encrypted data

• F. Autrusseau, JP. Guedon, Y. Bizais, "Watermarking and cryptographic schemes formedical imaging", SPIE Medical Imaging, Image processing, vol. 5032-105, pp.958-965, San Diego CA, USA, 15-20 February 2003.

• F. Autrusseau, JP. Guedon, "A joint multiple description-encryption image algorithm ",IEEE International Conference on Image Processing, ICIP’03, (3), pp. 269-272,Barcelona, Spain, 2003.

18 / 28

Page 21: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Mojette encryption.Backprojection path.

Mojette bins

(p,q)

= (-1,

1)

(p,q) = (0,-1)

(p,q) = (1,1)1

23

45 6

789

10

13 12 11

156

10

1 23

45 6

789

10

13 12 11

1510

12

34

5 67

8910

13 12 11

153

1 23

45 6

789

10

13 12 11

15

12

34

5 67

8910

13 12 11

5813

1 23

45 6

789

10

13 12 11

5827

list of one-to-one pixel-bin

correspondence

Figure : Encryption

19 / 28

Page 22: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Mojette encryption.The number of possible paths significantly increases.

C kn = n!

k!×(n−k)!

#bins 19 20 22 23 24 25 30 34C kn 969 4845 74613 2.45 7.35 2.06 1.48 2.29

Directions (1,5) (1,1) (1,6) (1,2) (1,0) (1,7) (1,1) (1,0)(1,3) (1,3) (1,1) (1,2) (1,1)

(1,3) (1,3) (1,2)(1,3)

Redundancy 0.187 0.250 0.375 0.437 0.500 0.562 0.875 1.125For a 4×4 ! image

20 / 28

Page 23: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Outline

1 CollaborationsCo-authorsPublicationsProjects

2 Security topicsWatermarking & encryption

3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding

4 Conclusion

21 / 28

Page 24: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Encryption+Coding with the Mojette.Encryption+Coding with the Mojette

• Inter-projections coding• Intra-projections coding

Inter-projections coding

• Basis Projection +• Uncorrelated data

Basis Projection / difference projection.

proj

ect i

mag

e

intra

-pro

ject

ion

Disp

lay

as im

age

inter-proj.

decorrelatedproj(1,102,b)

proj(1,103,b)

proj(1,102,bx,by)

proj(1,103,bx,by)

image256 x 205

codedprojection

basisprojection

coded basisprojection

entro

py c

ode

22 / 28

Page 25: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Encryption+Coding with the Mojette.

A cascade of projections.

entro

py c

ode

and

stor

e

inter-proj.

decorrelated projections

image

coded projections

basis 1

inter-proj.

inter-proj.

basis 2

basis 3

proj

ect i

mag

e

intra

-pro

ject

ion

intra

-pro

ject

ion

proj

ect b

asis

1

intra

-pro

ject

ion

proj

ect b

asis

2

A. Kingston, S. Colosimo, P. Campisi, F. Autrusseau, "Lossless Image Compression andSelective Encryption Using a Discrete Radon Transform", IEEE International Conference onImage Processing, ICIP’07, vol. 4, pp. 465-468, San Antonio, TX, USA, 2007.

23 / 28

Page 26: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

Encryption+Coding with the Mojette.Results

0 1 2 3 4 5 6 7 8 9 10 11 12 130

20

40

60

80

100

Number of loops

image ref 91782, 85 Mpixelsimage ref 91813, 85 Mpixelsimage ref 91847, 86 Mpixelsimage ref 91851, 83 Mpixels

0 1 2 3 4 5 6 7 8 9 10 11 12 13100

150

200

250

300

350

400

450

500

Number of loops

image ref 91782, 85 Mpixelsimage ref 91813, 85 Mpixelsimage ref 91847, 86 Mpixelsimage ref 91851, 83 Mpixels

0 1 2 3 4 5 6 7 8 9 10 11 12 130

10

20

30

40

50

60

Number of loops

image ref 91782, 85 Mpixelsimage ref 91813, 85 Mpixelsimage ref 91847, 86 Mpixelsimage ref 91851, 83 Mpixels

pro Fit TRIAL version

0

100

200

300

400

500Full image AESFull image 3DESCascaded Mojette + AESCascaded Mojette + 3DES

CPU

Tim

e (s

)

Image size (pixels)

256

x 36

9

512

x 73

7

768

x 11

06

1024

x 1

475

2048

x 2

950

3072

x 4

425

6144

x 8

850

4096

x 5

900

1536

x 2

213

7738

x 1

1146

24 / 28

Page 27: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

ConclusionConclusion

• Initially: image watermarking...• Encountered some issues to watermark the bins, obtaina stable reconstruction and offer sufficient robustness.

• → Let’s do some encryption.• Efficient selective encryption methods..• Encryption+coding.• + Some other works on Mojette encryption (E. Grall &B. Parrein)

TODOs

• Use Mojette encryption in a distributed storageframework (Fizians)

• ...25 / 28

Page 28: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

CollaborationsCo-authorsPublicationsProjects

Security topicsWatermarking &encryption

Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding

Conclusion

ConclusionConclusion

• Initially: image watermarking...• Encountered some issues to watermark the bins, obtaina stable reconstruction and offer sufficient robustness.

• → Let’s do some encryption.• Efficient selective encryption methods..• Encryption+coding.• + Some other works on Mojette encryption (E. Grall &B. Parrein)

TODOs

• Use Mojette encryption in a distributed storageframework (Fizians)

• ...25 / 28

Page 29: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

AppendixRéférences

Références IJ. Dong, L. Su, Y. Zhang, F. Autrusseau, Y. Zhanbin, "Estimating IlluminationDirection of 3D Surface Texture Based on Active Basis and Mojette Transform",SPIE-JEI 2013

C. Zhang, J. Dong, J. Li, F. Autrusseau, "A New Information Hiding Method for ImageWatermarking Based on Mojette Transform", ISNNS, 2010

A. Kingston, F. Autrusseau, E. Grall, T. Hamon, B. Parrein, "Mojette based security"(chap 10) The Mojette transform: Theory and Applications,wiley, 2009

A. Kingston, F. Autrusseau, "Lossless compression" (chap 9) The Mojette transform:Theory and Applications, wiley, 2009

A. Kingston, F. Autrusseau, B. Parrein, "Multiresolution Mojette transform" (chap 6),The Mojette transform: Theory and Applications, wiley, 2009

A. Kingston, F. Autrusseau, "Lossless Image Compression via Predictive Coding ofDiscrete Radon Projections", Elsevier SigPro Image, 2008

A. Kingston, B. Parrein, F. Autrusseau, "Redundant Image Representation viaMulti-Scale Digital Radon Projection", IEEE-ICIP 2008

P. Jia, J. Dong, L. Qi, F. Autrusseau, "Directionality Measurement and IlluminationEstimation of 3D Surface Textures by Using Mojette Transform", IEEE-ICPR 2008

A. Kingston, S. Colosimo, P. Campisi, F. Autrusseau, "Lossless Image Compression andSelective Encryption Using a Discrete Radon Transform", IEEE-ICIP 2007

26 / 28

Page 30: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

AppendixRéférences

Références II

F. Autrusseau, P. Evenou, T. Hamon, "Secure Distributed Storage based on theMojette transform", Notere 2006

F. Autrusseau, B. Parrein, M. Servieres, "Lossless Compression Based on a Discrete andExact Radon Transform: A Preliminary Study",IEEE-ICASSP 2006

V. Ricordel, F. Autrusseau, W. Dupuy, D. Barba, "1D-mosaics grouping using latticevector quantization for a video browsing application", CBMI 2005

F. Autrusseau, JP. Guédon, "Chiffrement Mojette d’images médicales", ISI, Lavoisier,2003

F. Autrusseau, JP. Guédon, Y. Bizais, "Watermarking and cryptographic schemes formedical imaging", SPIE Medical Imaging, 2003

F. Autrusseau, JP. Guédon, "A joint multiple description-encryption image algorithm",ICIP 2003

F. Autrusseau, JP. Guédon, "Perceptual image watermarking using a secure Mojettetransmission scheme", COST 276, 2003

F. Autrusseau, JP. Guédon, "Image Watermarking in the Fourier Domain Using theMojette Transform", IEEE-DSP, 2002

F. Autrusseau, JP. Guédon, "Image watermarking for copyright protection and datahiding via the Mojette transform", SPIE 2002

27 / 28

Page 31: Collaborations Encryption, Watermarking and · PDF fileencryption Workswithinthe IRCCyNlab. watermarking Encryptionpto Encryption+Coding Conclusion Encryption, Watermarking and Mojette

Security &Mojette

FlorentAutrusseau

AppendixRéférences

Références III

F. Autrusseau, "Modélisation Psychovisuelle pour le tatouage des images", Ph. D.Thesis, U. Nantes, 2002.

JP. Guédon, N. Normand, P. Verbert, B. Parrein, F. Autrusseau, "Load-balancing and

scalable multimedia distribution using the Mojette transform", ITCOM, 2001

28 / 28