Skip to main content

Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks

  • Conference paper
Advances in Databases (BNCOD 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7051))

Included in the following conference series:

Abstract

Today, more and more data is available in digital form, ranging from normal text to multimedia data such as image or video data. Since some data is of high sensitivity or undergoes legal restrictions, it is important to obtain more reliable information about the data origin and its transformations, known as data provenance. Unfortunately, current approaches for data provenance neither support multimedia data nor provide mechanisms to ensure reliability of the provenance information. In this paper, we present an approach based on existing watermarking schemes evaluated by a database system. Hence, this approach ensures the reliability of multi media data (e.g., fingerprint data) and its corresponding provenance information. Furthermore, we show how this approach can be applied within a specific database, used for fingerprint verification.

This work has been funded by the German Federal Ministry of Education and Science (BMBF) through the Research Programme under Contract No. FKZ:13N10817 and FKZ:13N10818.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Proc. Int. Conf. on Very Large Data Bases, pp. 155–166 (2002)

    Google Scholar 

  2. Ashbaugh, D.: Ridgeology – modern evaluative friction ridge identification. Journal of Forensic Identification 41(1), 16–64 (1991)

    MathSciNet  Google Scholar 

  3. Buneman, P., Chapman, A., Cheney, J.: Provenance management in curated databases. In: Proc. Int. Conf. on Management of Data, pp. 539–550. ACM, New York (2006)

    Google Scholar 

  4. Buneman, P., Khanna, S., Tan, W.C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 316–330. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  5. Buneman, P., Khanna, S., Tan, W.C.: On propagation of deletions and annotations through views. In: Proc. Symp. on Principles of Database Systems, pp. 150–158. ACM, New York (2002)

    Google Scholar 

  6. Celik, M., Sharma, G., Tekalp, A., Saber, E.: Lossless generalized-lsb data embedding. IEEE Transactions on Image Processing 14(2), 253–266 (2005)

    Article  Google Scholar 

  7. Cheney, J., Chiticariu, L., Tan, W.C.: Provenance in databases: Why, how, and where. Foundations and Trends in Databases 1(4), 379–474 (2009)

    Article  Google Scholar 

  8. Coltuc, D., Chassery, J.M.: Very fast watermarking by reversible contrast mapping. Signal Processing Letters 14(4), 255–258 (2007)

    Article  Google Scholar 

  9. Cox, I., Miller, M., Bloom, J.: Digital Watermarking: Principles and Practice. Morgan Kaufmann, San Francisco (2001)

    Google Scholar 

  10. Cui, Y., Widom, J.: Practical lineage tracing in data warehouses. In: Proc. Int. Conf. on Data Engineering, pp. 367–378. IEEE, Los Alamitos (2000)

    Google Scholar 

  11. Cui, Y., Widom, J., Wiener, J.: Tracing the lineage of view data in a data warehousing environment. ACM Trans. on Database Systems 25(2), 179–227 (2000)

    Article  Google Scholar 

  12. Dittmann, J., Wohlmacher, P., Nahrstedt, K.: Using cryptografic and watermarking algorithms. IEEE Multimedia 8(4), 54–65 (2001)

    Article  Google Scholar 

  13. Dubey, S., Anna, T., Shakher, C., Mehta, D.: Fingerprint detection using full-field swept-source optical coherence tomography. Applied Physics Letters 91(18), 1–3 (2007)

    Article  Google Scholar 

  14. Feng, J., Lin, I., Tsai, C., Chu, Y.: Reversible watermarking: Current status and key issues. International Journal of Network Security 2(3), 161–171 (2006)

    Google Scholar 

  15. Galton, F.: Fingerprints. MacMillan and Co., NYC (1892)

    Google Scholar 

  16. Glavic, B., Dittrich, K.: Data provenance: A categorization of existing approaches. In: GI-Fachtagung für Datenbanksysteme (BTW), pp. 227–241 (2007)

    Google Scholar 

  17. Guo, H., Li, Y., Jajodia, S.: Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci. 177(1), 281–298 (2007)

    Article  Google Scholar 

  18. Gupta, A.: Data provenance. In: Encyclopedia of Database Systems, p. 608. Springer, Heidelberg (2009)

    Google Scholar 

  19. Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. of IEEE 87(7), 1079–1107 (2002)

    Article  Google Scholar 

  20. Kuivalainen, K., Peiponen, K.E., Myller, K.: Application of a diffractive element-based sensor for detection of latent fingerprints from a curved smooth surface. Measurement Sci. and Tech. 20(7), 207–211 (2009)

    Article  Google Scholar 

  21. Lin, S., Engheta, N., Pugh Jr., E., Yemelyanov, K.: Polarization- and specular-reflection-based, non-contact latent fingerprint imaging and lifting. Journal of Opt. Soc. of America 23(9), 2137–2153 (2006)

    Article  Google Scholar 

  22. Merkel, R., Kraetzer, C., Dittmann, J., Vielhauer, C.: Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints - a capacity study for forensic approaches. To Appear in Int’l. Conf. on Digital Signal Processing (2011)

    Google Scholar 

  23. Simmhan, Y., Plale, B., Gannon, D.: A survey of data provenance techniques. Tech. Rep. IUB-CS-TR618, Department of Computer Science, Indiana University, Bloomington (2005)

    Google Scholar 

  24. Sion, R.: Proving ownership over categorical data. In: Proc. Int. Conf. on Data Engineering, pp. 584–595 (2004)

    Google Scholar 

  25. Sion, R.: Database watermarking for copyright protection. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, pp. 297–328. Springer, US (2008)

    Chapter  Google Scholar 

  26. Tan, W.C.: Research problems in data provenance. IEEE Data Eng. Bull. 27(4), 42–52 (2004)

    Google Scholar 

  27. Tan, W.C.: Provenance in databases: Past, current, and future. IEEE Data Eng. Bull. 32(4), 3–12 (2007)

    Google Scholar 

  28. Tian, J.: Reversible data embedding using a difference expansion. Circuits and Systems for Video Technology 13(8), 890–896 (2003)

    Article  Google Scholar 

  29. Tsai, W., Wei, X., Chen, Y., Paul, R., Chung, J.Y., Zhang, D.: Data provenance in soa: Security, reliability, and integrity. Service Oriented Computing and Applications 1, 223–247 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schäler, M., Schulze, S., Merkel, R., Saake, G., Dittmann, J. (2011). Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks. In: Fernandes, A.A.A., Gray, A.J.G., Belhajjame, K. (eds) Advances in Databases. BNCOD 2011. Lecture Notes in Computer Science, vol 7051. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24577-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24577-0_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24576-3

  • Online ISBN: 978-3-642-24577-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics