Abstract
There is a growing need for confidential institutions to actively check the documents in Internet for detecting some leaked confidential images. This paper presents an efficient method of active image betrayal checking based on a new type of watermarking in addition to the user-specific fingerprint. The implemented organization’s watermarking, as a ‘fingerprint’ for a group of staffs, with a codeword length far shorter than that of the user-specific fingerprint, is extracted from a suspected image at the first stage of betrayal checking, for the purpose of reducing the number of suspected images by a great deal. Then, only the remaining suspected images are subjected to the time-consuming user-specific fingerprint checking. Experimental tests confirmed the improved efficiency of this method.
Similar content being viewed by others
References
Andoni A, Indyk P (2006) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Foundations of Computer Science, 459–468
Barg A, Blakley GR, Kabatiansky GA (2003) Digital fingerprinting codes: problem statements, constructions, identification of traitors. IEEE Trans Inf Theory 49(4):852–865
Boneh D, Shaw J (1998) Collusion-secure fingerprinting for digital data. IEEE Trans Inf Theory 44:1897–1905
Cox I, Kilian J, Leighton F, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE J Sel Area Comm 16(4):587–593
Datar M, Immorlica N, Indyk P, Mirrokni VS (2004) Locality-sensitive hashing scheme based on p-stable distributions, In Symposium on Computational Geometry (SCG), 253–262
Datta R, Joshi D, Li J, Wang JZ (2008) Image retrieval: ideas, influences, and trends of the new age. ACM Trans Comput Surv 40(2):1–60
Deng F, Yu Y Counting the number of intransitive triangles for near duplicate detection, to be published
Fernández M, Soriano M (2002) Fingerprinting concatenated codes with efficient identification, Information Security (ISC’02), LNCS 2433, Springer, 459–470
Hexmoor H, Wilson S, Bhattaram S (2006) A theoretical inter-organizational trust-based security model. Knowl Eng Rev 21(2):127–161
Hsu CT, Wu JL (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1):58–68
Hu A, Chen N (2008) A blind watermarking algorithm for color image based on wavelet transform and Fourier transform. Proceedings of The 9th International Conference for Young Computer Scientists (ICYCS 2008), vol. 2, Zhang Jia Jie, China, 1453–1458
Kilian J, Leighton T, Matheson LR, Shamoon TG, Tarjan RE, Zane F (1998) Resistance of digital watermarks to collusive attacks, Tech. Rep. TR-585-98, Dept. Compute. Sci., Princeton Univ., 71–271
Li G, Pei S, Chen G, Cao W, Wu B (2009) A self-embedded watermarking scheme based on relationship function of corresponding inter-blocks DCT coefficient, Proceedings of the 2009 13th International Conference on Computer Supported Cooperative Work in Design, Santiago, 107–112
Li Z, Trappe W (2005) Collusion-resistant fingerprints from WBE sequence sets. In Proc. IEEE ICC 2005, Seoul, Korea, 1336–1340
O’Ruanaidh JJK, Pun T (1997) Rotation, Scale and translation invariant digital image watermarking, In proceedings of the International conference on Image Processing, Vol, 536, Santa Barbara, CA, U S A, 536–539
Piva A (1997) DCT-based watermark recovering without resorting to the uncorrupted original images. Proc ICIP 1:520–523
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
Torralba A, Fergus R, Freeman WT (2008) 80 million tiny images: a large data set for nonparametric object and scene recognition. IEEE Trans Pattern Anal Mach Intell 30(11):1958–1970
Wang HJM, Su PC, Kou CCJ (1998) Wavelet based digital image watermarking. Opt Express 13(112):491–496
Wang ZJ, Wu M, Zhao H, Trappe W, Liu KJR (2005) Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans Image Process 14(6):804–821
Yan Y, Cao W, Li S (2009) Block-based adaptive image watermarking scheme using Just Noticeable Difference. Proceedings of 2009 IEEE International Workshop on Imaging Systems and Techniques(IST ’09.), Shenzhen, 377–380
Yang W-M, Jin Z (2009) A watermarking algorithm based on wavelet and cosine transform for color image. Proceedings of 2009 First International Workshop on Education Technology and Computer Science, vol. 2, Wuhan, Hubei, China, 899–903
Yu Y, Chen X (2010) Image betrayal checking based on the digital fingerprint of images on the Internet. J Southwest Jiaotong Univ 18(2):149–159
Zane F (2005) Efficient watermark detection and collusion security, In Proc. Financial Cryptography, vol. 1962, 21–32
Zhu Y, Feng DG, Yang YT (2005) Convolutional Fingerprinting Information Codes for Collusion Security, in Proceedings of the SPIE conference on Mathematics of Data/Image Coding, Compression, and Encryption VIII with Applications, San Diego, 266–274
Acknowledgment
This paper is supported by National Natural Science Foundation of China (No.61170093) and China Postdoctoral Science Foundation (No.20110491149).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yu, Y., Cheng, J., Wei, Z. et al. Image betrayal checking based on organization’s watermarking in Internet. Multimed Tools Appl 71, 1249–1262 (2014). https://doi.org/10.1007/s11042-012-1276-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-012-1276-9