Skip to main content
Log in

Image betrayal checking based on organization’s watermarking in Internet

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

There is a growing need for confidential institutions to actively check the documents in Internet for detecting some leaked confidential images. This paper presents an efficient method of active image betrayal checking based on a new type of watermarking in addition to the user-specific fingerprint. The implemented organization’s watermarking, as a ‘fingerprint’ for a group of staffs, with a codeword length far shorter than that of the user-specific fingerprint, is extracted from a suspected image at the first stage of betrayal checking, for the purpose of reducing the number of suspected images by a great deal. Then, only the remaining suspected images are subjected to the time-consuming user-specific fingerprint checking. Experimental tests confirmed the improved efficiency of this method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Andoni A, Indyk P (2006) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Foundations of Computer Science, 459–468

  2. Barg A, Blakley GR, Kabatiansky GA (2003) Digital fingerprinting codes: problem statements, constructions, identification of traitors. IEEE Trans Inf Theory 49(4):852–865

    Article  MATH  MathSciNet  Google Scholar 

  3. Boneh D, Shaw J (1998) Collusion-secure fingerprinting for digital data. IEEE Trans Inf Theory 44:1897–1905

    Article  MATH  MathSciNet  Google Scholar 

  4. Cox I, Kilian J, Leighton F, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  5. Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE J Sel Area Comm 16(4):587–593

    Article  Google Scholar 

  6. Datar M, Immorlica N, Indyk P, Mirrokni VS (2004) Locality-sensitive hashing scheme based on p-stable distributions, In Symposium on Computational Geometry (SCG), 253–262

  7. Datta R, Joshi D, Li J, Wang JZ (2008) Image retrieval: ideas, influences, and trends of the new age. ACM Trans Comput Surv 40(2):1–60

    Article  Google Scholar 

  8. Deng F, Yu Y Counting the number of intransitive triangles for near duplicate detection, to be published

  9. Fernández M, Soriano M (2002) Fingerprinting concatenated codes with efficient identification, Information Security (ISC’02), LNCS 2433, Springer, 459–470

  10. Hexmoor H, Wilson S, Bhattaram S (2006) A theoretical inter-organizational trust-based security model. Knowl Eng Rev 21(2):127–161

    Article  Google Scholar 

  11. Hsu CT, Wu JL (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1):58–68

    Article  Google Scholar 

  12. Hu A, Chen N (2008) A blind watermarking algorithm for color image based on wavelet transform and Fourier transform. Proceedings of The 9th International Conference for Young Computer Scientists (ICYCS 2008), vol. 2, Zhang Jia Jie, China, 1453–1458

  13. Kilian J, Leighton T, Matheson LR, Shamoon TG, Tarjan RE, Zane F (1998) Resistance of digital watermarks to collusive attacks, Tech. Rep. TR-585-98, Dept. Compute. Sci., Princeton Univ., 71–271

  14. Li G, Pei S, Chen G, Cao W, Wu B (2009) A self-embedded watermarking scheme based on relationship function of corresponding inter-blocks DCT coefficient, Proceedings of the 2009 13th International Conference on Computer Supported Cooperative Work in Design, Santiago, 107–112

  15. Li Z, Trappe W (2005) Collusion-resistant fingerprints from WBE sequence sets. In Proc. IEEE ICC 2005, Seoul, Korea, 1336–1340

  16. O’Ruanaidh JJK, Pun T (1997) Rotation, Scale and translation invariant digital image watermarking, In proceedings of the International conference on Image Processing, Vol, 536, Santa Barbara, CA, U S A, 536–539

  17. Piva A (1997) DCT-based watermark recovering without resorting to the uncorrupted original images. Proc ICIP 1:520–523

    Google Scholar 

  18. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  19. Torralba A, Fergus R, Freeman WT (2008) 80 million tiny images: a large data set for nonparametric object and scene recognition. IEEE Trans Pattern Anal Mach Intell 30(11):1958–1970

    Article  Google Scholar 

  20. Wang HJM, Su PC, Kou CCJ (1998) Wavelet based digital image watermarking. Opt Express 13(112):491–496

    Article  Google Scholar 

  21. Wang ZJ, Wu M, Zhao H, Trappe W, Liu KJR (2005) Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans Image Process 14(6):804–821

    Article  Google Scholar 

  22. Yan Y, Cao W, Li S (2009) Block-based adaptive image watermarking scheme using Just Noticeable Difference. Proceedings of 2009 IEEE International Workshop on Imaging Systems and Techniques(IST ’09.), Shenzhen, 377–380

  23. Yang W-M, Jin Z (2009) A watermarking algorithm based on wavelet and cosine transform for color image. Proceedings of 2009 First International Workshop on Education Technology and Computer Science, vol. 2, Wuhan, Hubei, China, 899–903

  24. Yu Y, Chen X (2010) Image betrayal checking based on the digital fingerprint of images on the Internet. J Southwest Jiaotong Univ 18(2):149–159

    Google Scholar 

  25. Zane F (2005) Efficient watermark detection and collusion security, In Proc. Financial Cryptography, vol. 1962, 21–32

  26. Zhu Y, Feng DG, Yang YT (2005) Convolutional Fingerprinting Information Codes for Collusion Security, in Proceedings of the SPIE conference on Mathematics of Data/Image Coding, Compression, and Encryption VIII with Applications, San Diego, 266–274

Download references

Acknowledgment

This paper is supported by National Natural Science Foundation of China (No.61170093) and China Postdoctoral Science Foundation (No.20110491149).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongsheng Yu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yu, Y., Cheng, J., Wei, Z. et al. Image betrayal checking based on organization’s watermarking in Internet. Multimed Tools Appl 71, 1249–1262 (2014). https://doi.org/10.1007/s11042-012-1276-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1276-9

Keywords

Navigation