Skip to main content

Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques

  • Conference paper
Book cover Digital Watermarking (IWDW 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5703))

Included in the following conference series:

Abstract

We propose a concept of feasible blind fingerprinting called “semi-blind fingerprinting” which provides as secure content trading as conventional blind fingerprinting methods. In a basic model of conventional fingerprinting for content trading, user’s security could be guaranteed only under the premise that a content provider is trustworthy. Such premise makes a scheme unpractical. To overcome this defect, various blind methods have been proposed in which cryptography is used in order to protect the information on a user. However, computation cost and robustness have not been well considered as a scheme should be feasible, though it provides high-level of protection. A semi-blind scheme fulfills a need for both feasibility and robustness. Under this scheme, feasibility can be achieved by applying newly proposed functions called “Image Division” instead of using cryptography. In order to gain robustness, a protocol for watermarking has been so designed that any well-developed existing watermarking technique can be applied with no restriction. We will not only propose the idea but also implement and evaluate several image division functions as well as an optimized embedding program in order to prove validity of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stefan Katzenbeisser, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)

    Google Scholar 

  2. Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  3. Pfitzmann, B., Waidner, M.: Anonymous fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  4. Iwamura, K., Sakurai, K., Imai, H.: Blind fingerprinting. Technical report of IEICE. ISEC 97, 63–74 (1997)

    Google Scholar 

  5. Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Processing, 2129–2139 (2005)

    Google Scholar 

  6. Prins, J.P., Erkin, Z., Lagendijk, R.: Anonymous fingerprinting with robust qim watermarking techniques. European Journal of Information Systems 2007, 1–13 (2007)

    Google Scholar 

  7. Okada, M., Kikuchi, H.: Secure asymmetric watermark detection without secret of modified pixels. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 165–178. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Okada, M., Kikuchi, H., Okabe, Y.: Multi-bit embedding in asymmetric digital watermarking without exposing secret information. IEICE E91-D(5), 1348–1358 (2008)

    Google Scholar 

  9. Furukawa, J.: Secure detection of watermarks. IEICE E87-A(1), 212–220 (2004)

    Google Scholar 

  10. Inaba, H., Yamamoto, Y.: Proposal on digital contents distribution system for protecting both privacy and copyrights. IEICE J89-D(12), 2536–2542 (2006)

    Google Scholar 

  11. Okada, M., Okabe, Y., Uehara, T.: A privacy enhanced image sharing system for surveillance cameras based on a fingerprinting technique. CSS 2008 (October 2008)

    Google Scholar 

  12. Okada, M., Okabe, Y., Uehara, T.: A privacy enhanced image sharing system on the sensing web based on a fingerprinting technique. In: International Workshop on Sensing Web (December 2008)

    Google Scholar 

  13. Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Processing 17(5), 58–64 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Okada, M., Okabe, Y., Uehara, T. (2009). Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds) Digital Watermarking. IWDW 2009. Lecture Notes in Computer Science, vol 5703. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03688-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03688-0_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03687-3

  • Online ISBN: 978-3-642-03688-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics