Skip to main content
Log in

Content distribution and copyright authentication based on combined indexing and watermarking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Copyright issues become more and more urgent with the wide spread of multimedia content over Internet, e.g., whether the media content is copyright-protected in multimedia social networks, or whether a media content is released on Internet illegally. To solve these problems, this paper proposes a content distribution and copyright authentication system based on media index and watermarking techniques. Before media distribution, the media content is marked (by embedding the ownership information or customer identification into the media), and the robust features that can be used both for media index and content emendation is extracted from the watermarked media and registered in a feature database. Some customer may leak out his media copy over Internet directly or after slight operations, such as rotation, shearing, scaling, translation, etc. To detect whether a media over Internet is copyright-protected or not, the following work is done. Firstly, a watermark is extracted from the media and compared with the original one. If the watermark exists, then the media is copyright-protected, and the authentication process is finished. Otherwise, a robust feature is extracted from the considered media and matched with the feature database. The matching result gives the operation parameters that are used to emend the media content. After media emendation, a watermark is extracted or detected again and used to authenticate the copyright. In this system, the robust feature is not only used to search the related media contents but also to emend the media in order to improve the robustness against such operations as adding noise, compression, rotation, shearing, scaling, translation, etc. Experimental results show that the combination of media index and watermark detection can improve the detection rate greatly.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Ahmad N, Park J, Kang G, Kang J, Beak J (2007) Object retrieval approach with invariant features based on corner shapes. 2007 IEEE International Symposium on Signal Processing and Information Technology, 15–18 Dec. 2007, page(s): 825–830

  2. Amsaleg L, Gros P (2001) Content-based retrieval using local descriptors: problems and issues from a database perspective. Pattern Anal Appl 4(2–3):108–124

    Article  MathSciNet  MATH  Google Scholar 

  3. Andoni A, Indyk P (2006) Near-optimal hashing algorithms for near neighbor problem in high dimensions. In Proceedings of the Symposium on Foundations of Computer Science (FOCS’06)

  4. Bas P, Chassery J-M, Macq B (2002) Geometrically invariant watermarking using feature points. IEEE Trans Image Process 11(9):1014–1028

    Article  Google Scholar 

  5. Berrani SA, Amsaleg L, Gros P (2003) Robust content-based image searches for copyright protection, in Proc. ACM Int. Workshop on Multimedia Databases, pp. 70–77

  6. Bhardwaji A, Pandey TP, Gupta S (2001) Joint indexing and watermarking of video using color information. 2001 IEEE Fourth Workshop on Multimedia Signal Processing, Page(s):333–338

  7. Boneh D, Shaw J (1998) Collusion-secure fingerprinting for digital data. IEEE Trans Inform Theory 44(5):1897–1905

    Article  MathSciNet  MATH  Google Scholar 

  8. Chang EY, Li C, Wang J-Z, Mork P, Wiederhold G (1999) Searching near-replicas of images via clustering, in Proc. SPIE: Multimedia Storage and Archiving Systems IV, 3846: 281–92

  9. Chatterji BN, Kokare M, Reddy AA, Jha RK (2003) Wavelets for content based image retrieval and digital watermarking for multimedia applications. 2003 and the Fourth Pacific Rim Conference on Multimedia. Vol. 2, 15–18 Dec. 2003, Page(s): 812–816

  10. Cheng Q, Huang TS (2001) An additive approach to transform-domain information hiding and optimum detection structure. IEEE Trans Multimedia 3(3):273–284

    Article  Google Scholar 

  11. Cheng Q, Huang TS (2002) Optimum detection and decoding of multiplicative watermarks in DFT domain. Proc IEEE Int Conf Acoust Speech Process 4:3477–3480

    Google Scholar 

  12. Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  13. Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking. Morgan-Kaufmann, San Francisco

    Google Scholar 

  14. Fishler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395

    Article  Google Scholar 

  15. Gruhl D, Lu A, Bender W (1996) Echo hiding, pre-proceedings: information hiding. Cambridge, UK, pp. 295-316

  16. Harris C, Stephens M (1988) A combined corner and edge detector. 4th Alvey Vision Conference. 147–151

  17. Hsiao J-H, Chen C-S, Chien L-F, Chen M-S (2007) A new approach to image copy detection based on extended feature sets. IEEE Trans Image Process 16(8):2069–2079

    Article  MathSciNet  Google Scholar 

  18. Joly A, Buisson O (2005) Discriminant local features selection using efficient density estimation in a large database, in Proc. ACM Int. workshop on Multimedia information retrieval. New York, pp. 201–208

  19. Joumaa H, Davoine F. An ICA based algorithm for video watermarking. In Proc. 2005 International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005), 2: 805–808

  20. Kim C (2003) Content-based image copy detection. Signal Process Image Commun 18(3):169–184

    Article  Google Scholar 

  21. Lewis AS, Knowles G (1992) Image compression using the 2-D wavelet transform. IEEE Trans Image Process 1(2):244–250

    Article  Google Scholar 

  22. Lian S, Wang Z (2008) Collusion-traceable secure multimedia distribution based on controllable modulation. IEEE Trans Circuits Syst Video Technol 18(10):1462–1467

    Article  Google Scholar 

  23. Lian S, Zhang Y (2009) Handbook of research on secure multimedia distribution. IGI Global (formerly Idea Group, Inc), March 2009

  24. Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in compressed video data. IEEE Trans Circuits Syst Video Technol 17(6):774–778

    Article  Google Scholar 

  25. Lian S, Kanellopoulos D, Ruffo G (2009) Recent advances in multimedia information system security. Informatica, Slovenian Society Informatika 33(1): 3-24

  26. Liu Z, Lian S, Dong Y, Wang H (2008) Desynchronized image fingerprint for large scale distribution. Proceedings of 2008 IEEE International Conference on Image Processing (ICIP2008), IEEE Publisher, October 2008, pp. 409–412

  27. Minghong P, Mandal MK, Basu A (2005) Image retrieval based on histogram of fractal parameters. IEEE Trans Multimedia 7(4):597–605

    Article  Google Scholar 

  28. Mokhtarian F, Suomela R (1998) Robust image corner detection through curvature scale space. IEEE Trans Pattern Anal Mach Intell 20(12):1376–1381

    Article  Google Scholar 

  29. Petitcolas FAP, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219–239

  30. Podilchuk CI, Zeng W (1998) Image-adaptive watermarking using visual models. IEEE J Sel Areas Commun 16(4):525–539

    Article  Google Scholar 

  31. Sebastien G, Alexandre W, Nathalie P (2003) Image or audiovisual sequence extraction method for extraction of an image or audiovisual sequence from an image flux, wherein images are analyzed to generate a reference index and this is compares with the current index. FR2843212

  32. Takeya F (2004) System for searching illegitimate use of contents. JP2004112318

  33. van Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark. Proc IEEE Int Conf Image Process 2:86–90, Austin, Texas

    Google Scholar 

  34. Wang ZJ, Wu M, Trappe W, Liu KJR (2004) Group-oriented fingerprinting for multimedia forensics. EURASIP J Appl Signal Process 4:2153–2173

    Google Scholar 

  35. Wang J, Lian S, Liu G, Dai Y (2008) Secure multimedia watermarking authentication in wavelet domain. SPIE J Electron Imaging 17(03):033010

    Article  Google Scholar 

  36. Weinheimer J, Qi X, Qi J (2006) Towards a Robust Feature-Based Watermarking Scheme. 2006 IEEE International Conference on Image Processing, Oct. 2006, pp. 1401–1404

  37. Wu Y (2005) Linear combination collusion attack and its application on an anti-collusion fingerprinting. IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005 (ICASSP ’05), 2:13–16

  38. Wu M, Lin C, Chang C (2005) Image copy detection with rotating tolerance, In CIS 2005, Part I, LNAI 3801, Springer, pp. 464–469

  39. Wu M, Trappe W, Wang ZJ, Liu R (2004) Collusion-resistant fingerprinting for multimedia. IEEE Signal Process Mag 21(2):15–27

    Article  Google Scholar 

  40. Wu M-N, Lin C-C, Chang C (2006) A robust content-based copy detection scheme. Fund Inform 71(2–3):351–366, IOS Press

    MathSciNet  MATH  Google Scholar 

  41. Xue G, Lu P (2004) A counter-geometric distortions data hiding scheme using double channels in color images. The 3rd IWDW. 42–54

  42. Yang Z, Cohen FS (1999) Image registration and object recognition using affine invariants and convex hulls. IEEE Trans Image Processing 8(7):934–946

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

The work was partially supported by France Telecom’s Invenio project through the grant code of ILAB-PEK09-016, National Natural Science Foundation of China under Grant No. 70901039, National Postdoctoral Science Foundation of China under Grant No. 20090450144, and Jiangsu Postdoctoral Science Foundation under Grant No. 0901104C.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xi Chen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lian, S., Chen, X. & Wang, J. Content distribution and copyright authentication based on combined indexing and watermarking. Multimed Tools Appl 57, 49–66 (2012). https://doi.org/10.1007/s11042-010-0521-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-010-0521-3

Keywords

Navigation