A Hybrid Cryptographic–Watermarking Framework for Secure Multimedia Transmission in Adversarial Environments

Authors

  • Madhuri Mohanrao Karad

Keywords:

Adversarial environments, AES-256 encryption, Cryptographic watermarking, DWT-SVD, Multimedia security, Spread-spectrum watermarking

Abstract

The rapid proliferation of digital multimedia content across open networks has precipitated an unprecedented demand for robust mechanisms that simultaneously ensure confidentiality, authenticity, and integrity of transmitted data. This paper presents a novel hybrid cryptographic watermarking framework that synergistically integrates AES-256 symmetric encryption, RSA-2048 public-key infrastructure, and a robust spread-spectrum digital watermarking algorithm to provide multi-layered protection for multimedia content in adversarial environments. The proposed framework employs a dual-phase protection strategy: in the first phase, the host multimedia content is encrypted using AES-256 in Cypher Block Chaining (CBC) mode, ensuring that the raw content remains confidential against eavesdropping attacks. In the second phase, an imperceptible yet robust digital watermark carrying authentication metadata is embedded into the encrypted domain using Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) techniques. The watermark signal is spread across multiple frequency sub-bands to enhance robustness against geometric, signal processing, and compression attacks. Experimental evaluations conducted on standard benchmark datasets, including USC-SIPI and BOWS-2, demonstrate that the proposed scheme achieves a Peak Signal-to-Noise Ratio (PSNR) exceeding 48 dB, a Normalised Correlation (NC) coefficient above 0.99, and a Bit Error Rate (BER) below 0.001 under various attack scenarios, including JPEG compression, Gaussian noise, rotation, and cropping. The framework also demonstrates resilience against known cryptographic attacks, including chosen-plaintext and known-plaintext attacks. The computational overhead remains within acceptable bounds for real-time multimedia streaming applications, making the proposed framework a viable solution for secure multimedia transmission in adversarial network environments.

References

I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, Dec. 1997.

R. B. Wolfgang and E. J. Delp, “Fragile watermarking using the VW2D watermark,” in Proceedings of SPIE/IS&T International Conference on Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, USA, Jan. 1999, pp. 204–213.

A. Adelsbach, S. Katzenbeisser and A. -R. Sadeghi, “Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure,” 2002 11th European Signal Processing Conference, Toulouse, France, 2002, pp. 1–4.

P. Meerwald and A. Uhl, “A survey of wavelet-domain watermarking algorithms,” in Proceeding of SPIE Security and Watermarking of Multimedia Contents III, vol. 4314, San Jose, CA, USA, Jan. 2001, pp. 505–516.

R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121–128, Mar. 2002.

B. Furht and D. Kirovski, Eds., Multimedia security handbook, 1st ed. CRC Press, 2004.

L. Qiao and K. Nahrstedt, “Watermarking methods for MPEG encoded video: towards resolving rightful ownership,” IEEE International Conference on Multimedia Computing and Systems (Cat. No.98TB100241), Austin, TX, USA, 1998, pp. 276–285.

M. Barni, F. Bartolini, and T. Furon, “A general framework for robust watermarking security,” Signal Processing, vol. 83, no. 10, pp. 2069–2084, Oct. 2003.

J. R. Hernandez, M. Amado and F. Perez-Gonzalez, “DCT-domain watermarking techniques for still images: detector performance analysis and a new structure,” in IEEE Transactions on Image Processing, vol. 9, no. 1, pp. 55–68, Jan. 2000.

W. Zhu, Z. Xiong and Y.-Q. Zhang, “Multiresolution watermarking for images and video,” in IEEE Transactions on Circuits and Systems for Video Technology, vol. 9, no. 4, pp. 545–550, June 1999.

C.-Y. Lin and S.-F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,” in IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 2, pp. 153–168, Feb 2001.

V. M. Potdar, S. Han and E. Chang, “A survey of digital image watermarking techniques,” INDIN ‘05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005, Perth, WA, Australia, 2005, pp. 709–716.

D.-T. Nguyen, T.-V. Tran, M.-T. Tran, and T.-L. Do, “EnhanceGuard: Lightweight and Robust Digital Watermarking with High Fidelity and Resistance to Image Degradations,” Communications in Computer and Information Science, pp. 46–62, Nov. 2025.

M. Tancik, B. Mildenhall and R. Ng, “StegaStamp: Invisible hyperlinks in physical photographs,” 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA, 2020, pp. 2114–2123.

X. Liang, S. Xiang, L. Yang, and J. Li, “Robust and reversible image watermarking in homomorphic encrypted domain,” Signal Processing: Image Communication, vol. 99, p. 116462, Nov. 2021.

A. O. Mulani and P. B. Mane, “Watermarking and cryptography based image authentication on reconfigurable platform,” Bulletin of Electrical Engineering and Informatics, vol. 6, no. 2, pp. 181–187, Jun. 2017.

A. O. Mulani and P. B. Mane, “Area optimization of cryptographic algorithm on less dense reconfigurable platform,” 2014 International Conference on Smart Structures and Systems (ICSSS), Chennai, India, 2014, pp. 86–89.

A. O. Mulani, V. V. Godase, S. R. Takale, and R. G. Ghodake, “Image authentication using cryptography and watermarking,” International Journal of Image Processing and Smart Sensors, vol. 1, no. 2, pp 27–34, Sep. 2025.

S. Salunkhe, A. O. Mulani, D. Shahane, M. Rana, S. M. Shukla, and M. M. Jadhav, “Secure image transmission using chaotic encryption and DWT watermarking on reconfigurable platform,” Journal of Discrete Mathematical Sciences & Cryptography, vol. 29, no. 1, pp. 349–361, 2026.

K. R. Chaudhari, A. O. Mulani, M. P. Gajare, V. Jadhav, P. Yawle, and A. V. Bang, “Bit error rate analysis of various error correction codes with concatenated RS-convolutional codes,” Journal of Discrete Mathematical Sciences & Cryptography, vol. 29, no. 1, pp. 199–214, 2026.

A. O. Mulani and P. B. Mane, DWT based robust invisible watermarking. Scholars’ Press, 2016.

A. O. Mulani and P. B. Mane, “Area efficient high speed FPGA based invisible watermarking for image authentication,” Indian journal of science and technology, vol. 9, no. 39, pp. 1–6, Oct. 2016.

P. R. Kulkarni, A. O. Mulani, and P. B. Mane, “Robust invisible watermarking for image authentication,” in Emerging Trends in Electrical, Communications and Information Technologies, Springer, Nov. 2016, pp. 193–200.

G. Shinde and A. O. Mulani, “A robust digital image watermarking using DWT-PCA,” International Journal of Innovations in Engineering Research and Technology, vol. 6, no. 4, pp. 1–7, Mar. 2021.

A. O. Mulani, and G. N. Shinde, “An approach for robust digital image watermarking using DWT‐PCA,” Journal of Science and Technology, vol. 6, no. 1, pp. 59–62, Aug. 2021.

A. O. Mulani and P. Mane, “Secure and area efficient implementation of digital image watermarking on reconfigurable platform,” International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 2, pp. 56–61, 2018.

S. Takale and A. O. Mulani, “DWT-PCA based video watermarking”, Journal of Electronics, Computer Networking and Applied Mathematics, vol. 2, no. 06, pp. 1–7, Nov. 2022.

S. Takale and A. O. Mulani, “Video watermarking system,” International Journal for Research in Applied Science & Engineering Technology, vol. 10, no. 3, pp. 105–107, Mar. 2022.

Published

2026-03-30

How to Cite

Madhuri Mohanrao Karad. (2026). A Hybrid Cryptographic–Watermarking Framework for Secure Multimedia Transmission in Adversarial Environments. Advance Research in Analog and Digital Communications, 46–56. Retrieved from https://matjournals.net/engineering/index.php/ARADC/article/view/3315