Advertisement

Multimedia Tools and Applications

, Volume 57, Issue 1, pp 49–66 | Cite as

Content distribution and copyright authentication based on combined indexing and watermarking

  • Shiguo Lian
  • Xi ChenEmail author
  • Jinwei Wang
Article

Abstract

Copyright issues become more and more urgent with the wide spread of multimedia content over Internet, e.g., whether the media content is copyright-protected in multimedia social networks, or whether a media content is released on Internet illegally. To solve these problems, this paper proposes a content distribution and copyright authentication system based on media index and watermarking techniques. Before media distribution, the media content is marked (by embedding the ownership information or customer identification into the media), and the robust features that can be used both for media index and content emendation is extracted from the watermarked media and registered in a feature database. Some customer may leak out his media copy over Internet directly or after slight operations, such as rotation, shearing, scaling, translation, etc. To detect whether a media over Internet is copyright-protected or not, the following work is done. Firstly, a watermark is extracted from the media and compared with the original one. If the watermark exists, then the media is copyright-protected, and the authentication process is finished. Otherwise, a robust feature is extracted from the considered media and matched with the feature database. The matching result gives the operation parameters that are used to emend the media content. After media emendation, a watermark is extracted or detected again and used to authenticate the copyright. In this system, the robust feature is not only used to search the related media contents but also to emend the media in order to improve the robustness against such operations as adding noise, compression, rotation, shearing, scaling, translation, etc. Experimental results show that the combination of media index and watermark detection can improve the detection rate greatly.

Keywords

Content distribution Copyright authentication Media index Watermark Multimedia social network Digital right management 

Notes

Acknowledgments

The work was partially supported by France Telecom’s Invenio project through the grant code of ILAB-PEK09-016, National Natural Science Foundation of China under Grant No. 70901039, National Postdoctoral Science Foundation of China under Grant No. 20090450144, and Jiangsu Postdoctoral Science Foundation under Grant No. 0901104C.

References

  1. 1.
    Ahmad N, Park J, Kang G, Kang J, Beak J (2007) Object retrieval approach with invariant features based on corner shapes. 2007 IEEE International Symposium on Signal Processing and Information Technology, 15–18 Dec. 2007, page(s): 825–830Google Scholar
  2. 2.
    Amsaleg L, Gros P (2001) Content-based retrieval using local descriptors: problems and issues from a database perspective. Pattern Anal Appl 4(2–3):108–124MathSciNetzbMATHCrossRefGoogle Scholar
  3. 3.
    Andoni A, Indyk P (2006) Near-optimal hashing algorithms for near neighbor problem in high dimensions. In Proceedings of the Symposium on Foundations of Computer Science (FOCS’06)Google Scholar
  4. 4.
    Bas P, Chassery J-M, Macq B (2002) Geometrically invariant watermarking using feature points. IEEE Trans Image Process 11(9):1014–1028CrossRefGoogle Scholar
  5. 5.
    Berrani SA, Amsaleg L, Gros P (2003) Robust content-based image searches for copyright protection, in Proc. ACM Int. Workshop on Multimedia Databases, pp. 70–77Google Scholar
  6. 6.
    Bhardwaji A, Pandey TP, Gupta S (2001) Joint indexing and watermarking of video using color information. 2001 IEEE Fourth Workshop on Multimedia Signal Processing, Page(s):333–338Google Scholar
  7. 7.
    Boneh D, Shaw J (1998) Collusion-secure fingerprinting for digital data. IEEE Trans Inform Theory 44(5):1897–1905MathSciNetzbMATHCrossRefGoogle Scholar
  8. 8.
    Chang EY, Li C, Wang J-Z, Mork P, Wiederhold G (1999) Searching near-replicas of images via clustering, in Proc. SPIE: Multimedia Storage and Archiving Systems IV, 3846: 281–92Google Scholar
  9. 9.
    Chatterji BN, Kokare M, Reddy AA, Jha RK (2003) Wavelets for content based image retrieval and digital watermarking for multimedia applications. 2003 and the Fourth Pacific Rim Conference on Multimedia. Vol. 2, 15–18 Dec. 2003, Page(s): 812–816Google Scholar
  10. 10.
    Cheng Q, Huang TS (2001) An additive approach to transform-domain information hiding and optimum detection structure. IEEE Trans Multimedia 3(3):273–284CrossRefGoogle Scholar
  11. 11.
    Cheng Q, Huang TS (2002) Optimum detection and decoding of multiplicative watermarks in DFT domain. Proc IEEE Int Conf Acoust Speech Process 4:3477–3480Google Scholar
  12. 12.
    Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRefGoogle Scholar
  13. 13.
    Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking. Morgan-Kaufmann, San FranciscoGoogle Scholar
  14. 14.
    Fishler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395CrossRefGoogle Scholar
  15. 15.
    Gruhl D, Lu A, Bender W (1996) Echo hiding, pre-proceedings: information hiding. Cambridge, UK, pp. 295-316Google Scholar
  16. 16.
    Harris C, Stephens M (1988) A combined corner and edge detector. 4th Alvey Vision Conference. 147–151Google Scholar
  17. 17.
    Hsiao J-H, Chen C-S, Chien L-F, Chen M-S (2007) A new approach to image copy detection based on extended feature sets. IEEE Trans Image Process 16(8):2069–2079MathSciNetCrossRefGoogle Scholar
  18. 18.
    Joly A, Buisson O (2005) Discriminant local features selection using efficient density estimation in a large database, in Proc. ACM Int. workshop on Multimedia information retrieval. New York, pp. 201–208Google Scholar
  19. 19.
    Joumaa H, Davoine F. An ICA based algorithm for video watermarking. In Proc. 2005 International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005), 2: 805–808Google Scholar
  20. 20.
    Kim C (2003) Content-based image copy detection. Signal Process Image Commun 18(3):169–184CrossRefGoogle Scholar
  21. 21.
    Lewis AS, Knowles G (1992) Image compression using the 2-D wavelet transform. IEEE Trans Image Process 1(2):244–250CrossRefGoogle Scholar
  22. 22.
    Lian S, Wang Z (2008) Collusion-traceable secure multimedia distribution based on controllable modulation. IEEE Trans Circuits Syst Video Technol 18(10):1462–1467CrossRefGoogle Scholar
  23. 23.
    Lian S, Zhang Y (2009) Handbook of research on secure multimedia distribution. IGI Global (formerly Idea Group, Inc), March 2009Google Scholar
  24. 24.
    Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in compressed video data. IEEE Trans Circuits Syst Video Technol 17(6):774–778CrossRefGoogle Scholar
  25. 25.
    Lian S, Kanellopoulos D, Ruffo G (2009) Recent advances in multimedia information system security. Informatica, Slovenian Society Informatika 33(1): 3-24Google Scholar
  26. 26.
    Liu Z, Lian S, Dong Y, Wang H (2008) Desynchronized image fingerprint for large scale distribution. Proceedings of 2008 IEEE International Conference on Image Processing (ICIP2008), IEEE Publisher, October 2008, pp. 409–412Google Scholar
  27. 27.
    Minghong P, Mandal MK, Basu A (2005) Image retrieval based on histogram of fractal parameters. IEEE Trans Multimedia 7(4):597–605CrossRefGoogle Scholar
  28. 28.
    Mokhtarian F, Suomela R (1998) Robust image corner detection through curvature scale space. IEEE Trans Pattern Anal Mach Intell 20(12):1376–1381CrossRefGoogle Scholar
  29. 29.
    Petitcolas FAP, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219–239Google Scholar
  30. 30.
    Podilchuk CI, Zeng W (1998) Image-adaptive watermarking using visual models. IEEE J Sel Areas Commun 16(4):525–539CrossRefGoogle Scholar
  31. 31.
    Sebastien G, Alexandre W, Nathalie P (2003) Image or audiovisual sequence extraction method for extraction of an image or audiovisual sequence from an image flux, wherein images are analyzed to generate a reference index and this is compares with the current index. FR2843212Google Scholar
  32. 32.
    Takeya F (2004) System for searching illegitimate use of contents. JP2004112318Google Scholar
  33. 33.
    van Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark. Proc IEEE Int Conf Image Process 2:86–90, Austin, TexasGoogle Scholar
  34. 34.
    Wang ZJ, Wu M, Trappe W, Liu KJR (2004) Group-oriented fingerprinting for multimedia forensics. EURASIP J Appl Signal Process 4:2153–2173Google Scholar
  35. 35.
    Wang J, Lian S, Liu G, Dai Y (2008) Secure multimedia watermarking authentication in wavelet domain. SPIE J Electron Imaging 17(03):033010CrossRefGoogle Scholar
  36. 36.
    Weinheimer J, Qi X, Qi J (2006) Towards a Robust Feature-Based Watermarking Scheme. 2006 IEEE International Conference on Image Processing, Oct. 2006, pp. 1401–1404Google Scholar
  37. 37.
    Wu Y (2005) Linear combination collusion attack and its application on an anti-collusion fingerprinting. IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005 (ICASSP ’05), 2:13–16Google Scholar
  38. 38.
    Wu M, Lin C, Chang C (2005) Image copy detection with rotating tolerance, In CIS 2005, Part I, LNAI 3801, Springer, pp. 464–469Google Scholar
  39. 39.
    Wu M, Trappe W, Wang ZJ, Liu R (2004) Collusion-resistant fingerprinting for multimedia. IEEE Signal Process Mag 21(2):15–27CrossRefGoogle Scholar
  40. 40.
    Wu M-N, Lin C-C, Chang C (2006) A robust content-based copy detection scheme. Fund Inform 71(2–3):351–366, IOS PressMathSciNetzbMATHGoogle Scholar
  41. 41.
    Xue G, Lu P (2004) A counter-geometric distortions data hiding scheme using double channels in color images. The 3rd IWDW. 42–54Google Scholar
  42. 42.
    Yang Z, Cohen FS (1999) Image registration and object recognition using affine invariants and convex hulls. IEEE Trans Image Processing 8(7):934–946MathSciNetzbMATHCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.France Telecom R&D (Orange Labs) BeijingBeijingPeople’s Republic of China
  2. 2.E-Commerce DepartmentNanjing UniversityNanjingPeople’s Republic of China
  3. 3.The 28th Research InstituteCETCNanjingPeople’s Republic of China

Personalised recommendations