Abstract
Today, more and more data is available in digital form, ranging from normal text to multimedia data such as image or video data. Since some data is of high sensitivity or undergoes legal restrictions, it is important to obtain more reliable information about the data origin and its transformations, known as data provenance. Unfortunately, current approaches for data provenance neither support multimedia data nor provide mechanisms to ensure reliability of the provenance information. In this paper, we present an approach based on existing watermarking schemes evaluated by a database system. Hence, this approach ensures the reliability of multi media data (e.g., fingerprint data) and its corresponding provenance information. Furthermore, we show how this approach can be applied within a specific database, used for fingerprint verification.
This work has been funded by the German Federal Ministry of Education and Science (BMBF) through the Research Programme under Contract No. FKZ:13N10817 and FKZ:13N10818.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Proc. Int. Conf. on Very Large Data Bases, pp. 155–166 (2002)
Ashbaugh, D.: Ridgeology – modern evaluative friction ridge identification. Journal of Forensic Identification 41(1), 16–64 (1991)
Buneman, P., Chapman, A., Cheney, J.: Provenance management in curated databases. In: Proc. Int. Conf. on Management of Data, pp. 539–550. ACM, New York (2006)
Buneman, P., Khanna, S., Tan, W.C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 316–330. Springer, Heidelberg (2000)
Buneman, P., Khanna, S., Tan, W.C.: On propagation of deletions and annotations through views. In: Proc. Symp. on Principles of Database Systems, pp. 150–158. ACM, New York (2002)
Celik, M., Sharma, G., Tekalp, A., Saber, E.: Lossless generalized-lsb data embedding. IEEE Transactions on Image Processing 14(2), 253–266 (2005)
Cheney, J., Chiticariu, L., Tan, W.C.: Provenance in databases: Why, how, and where. Foundations and Trends in Databases 1(4), 379–474 (2009)
Coltuc, D., Chassery, J.M.: Very fast watermarking by reversible contrast mapping. Signal Processing Letters 14(4), 255–258 (2007)
Cox, I., Miller, M., Bloom, J.: Digital Watermarking: Principles and Practice. Morgan Kaufmann, San Francisco (2001)
Cui, Y., Widom, J.: Practical lineage tracing in data warehouses. In: Proc. Int. Conf. on Data Engineering, pp. 367–378. IEEE, Los Alamitos (2000)
Cui, Y., Widom, J., Wiener, J.: Tracing the lineage of view data in a data warehousing environment. ACM Trans. on Database Systems 25(2), 179–227 (2000)
Dittmann, J., Wohlmacher, P., Nahrstedt, K.: Using cryptografic and watermarking algorithms. IEEE Multimedia 8(4), 54–65 (2001)
Dubey, S., Anna, T., Shakher, C., Mehta, D.: Fingerprint detection using full-field swept-source optical coherence tomography. Applied Physics Letters 91(18), 1–3 (2007)
Feng, J., Lin, I., Tsai, C., Chu, Y.: Reversible watermarking: Current status and key issues. International Journal of Network Security 2(3), 161–171 (2006)
Galton, F.: Fingerprints. MacMillan and Co., NYC (1892)
Glavic, B., Dittrich, K.: Data provenance: A categorization of existing approaches. In: GI-Fachtagung für Datenbanksysteme (BTW), pp. 227–241 (2007)
Guo, H., Li, Y., Jajodia, S.: Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci. 177(1), 281–298 (2007)
Gupta, A.: Data provenance. In: Encyclopedia of Database Systems, p. 608. Springer, Heidelberg (2009)
Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. of IEEE 87(7), 1079–1107 (2002)
Kuivalainen, K., Peiponen, K.E., Myller, K.: Application of a diffractive element-based sensor for detection of latent fingerprints from a curved smooth surface. Measurement Sci. and Tech. 20(7), 207–211 (2009)
Lin, S., Engheta, N., Pugh Jr., E., Yemelyanov, K.: Polarization- and specular-reflection-based, non-contact latent fingerprint imaging and lifting. Journal of Opt. Soc. of America 23(9), 2137–2153 (2006)
Merkel, R., Kraetzer, C., Dittmann, J., Vielhauer, C.: Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints - a capacity study for forensic approaches. To Appear in Int’l. Conf. on Digital Signal Processing (2011)
Simmhan, Y., Plale, B., Gannon, D.: A survey of data provenance techniques. Tech. Rep. IUB-CS-TR618, Department of Computer Science, Indiana University, Bloomington (2005)
Sion, R.: Proving ownership over categorical data. In: Proc. Int. Conf. on Data Engineering, pp. 584–595 (2004)
Sion, R.: Database watermarking for copyright protection. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, pp. 297–328. Springer, US (2008)
Tan, W.C.: Research problems in data provenance. IEEE Data Eng. Bull. 27(4), 42–52 (2004)
Tan, W.C.: Provenance in databases: Past, current, and future. IEEE Data Eng. Bull. 32(4), 3–12 (2007)
Tian, J.: Reversible data embedding using a difference expansion. Circuits and Systems for Video Technology 13(8), 890–896 (2003)
Tsai, W., Wei, X., Chen, Y., Paul, R., Chung, J.Y., Zhang, D.: Data provenance in soa: Security, reliability, and integrity. Service Oriented Computing and Applications 1, 223–247 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schäler, M., Schulze, S., Merkel, R., Saake, G., Dittmann, J. (2011). Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks. In: Fernandes, A.A.A., Gray, A.J.G., Belhajjame, K. (eds) Advances in Databases. BNCOD 2011. Lecture Notes in Computer Science, vol 7051. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24577-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-24577-0_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24576-3
Online ISBN: 978-3-642-24577-0
eBook Packages: Computer ScienceComputer Science (R0)