Abstract
Copyright issues become more and more urgent with the wide spread of multimedia content over Internet, e.g., whether the media content is copyright-protected in multimedia social networks, or whether a media content is released on Internet illegally. To solve these problems, this paper proposes a content distribution and copyright authentication system based on media index and watermarking techniques. Before media distribution, the media content is marked (by embedding the ownership information or customer identification into the media), and the robust features that can be used both for media index and content emendation is extracted from the watermarked media and registered in a feature database. Some customer may leak out his media copy over Internet directly or after slight operations, such as rotation, shearing, scaling, translation, etc. To detect whether a media over Internet is copyright-protected or not, the following work is done. Firstly, a watermark is extracted from the media and compared with the original one. If the watermark exists, then the media is copyright-protected, and the authentication process is finished. Otherwise, a robust feature is extracted from the considered media and matched with the feature database. The matching result gives the operation parameters that are used to emend the media content. After media emendation, a watermark is extracted or detected again and used to authenticate the copyright. In this system, the robust feature is not only used to search the related media contents but also to emend the media in order to improve the robustness against such operations as adding noise, compression, rotation, shearing, scaling, translation, etc. Experimental results show that the combination of media index and watermark detection can improve the detection rate greatly.
Similar content being viewed by others
References
Ahmad N, Park J, Kang G, Kang J, Beak J (2007) Object retrieval approach with invariant features based on corner shapes. 2007 IEEE International Symposium on Signal Processing and Information Technology, 15–18 Dec. 2007, page(s): 825–830
Amsaleg L, Gros P (2001) Content-based retrieval using local descriptors: problems and issues from a database perspective. Pattern Anal Appl 4(2–3):108–124
Andoni A, Indyk P (2006) Near-optimal hashing algorithms for near neighbor problem in high dimensions. In Proceedings of the Symposium on Foundations of Computer Science (FOCS’06)
Bas P, Chassery J-M, Macq B (2002) Geometrically invariant watermarking using feature points. IEEE Trans Image Process 11(9):1014–1028
Berrani SA, Amsaleg L, Gros P (2003) Robust content-based image searches for copyright protection, in Proc. ACM Int. Workshop on Multimedia Databases, pp. 70–77
Bhardwaji A, Pandey TP, Gupta S (2001) Joint indexing and watermarking of video using color information. 2001 IEEE Fourth Workshop on Multimedia Signal Processing, Page(s):333–338
Boneh D, Shaw J (1998) Collusion-secure fingerprinting for digital data. IEEE Trans Inform Theory 44(5):1897–1905
Chang EY, Li C, Wang J-Z, Mork P, Wiederhold G (1999) Searching near-replicas of images via clustering, in Proc. SPIE: Multimedia Storage and Archiving Systems IV, 3846: 281–92
Chatterji BN, Kokare M, Reddy AA, Jha RK (2003) Wavelets for content based image retrieval and digital watermarking for multimedia applications. 2003 and the Fourth Pacific Rim Conference on Multimedia. Vol. 2, 15–18 Dec. 2003, Page(s): 812–816
Cheng Q, Huang TS (2001) An additive approach to transform-domain information hiding and optimum detection structure. IEEE Trans Multimedia 3(3):273–284
Cheng Q, Huang TS (2002) Optimum detection and decoding of multiplicative watermarks in DFT domain. Proc IEEE Int Conf Acoust Speech Process 4:3477–3480
Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking. Morgan-Kaufmann, San Francisco
Fishler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395
Gruhl D, Lu A, Bender W (1996) Echo hiding, pre-proceedings: information hiding. Cambridge, UK, pp. 295-316
Harris C, Stephens M (1988) A combined corner and edge detector. 4th Alvey Vision Conference. 147–151
Hsiao J-H, Chen C-S, Chien L-F, Chen M-S (2007) A new approach to image copy detection based on extended feature sets. IEEE Trans Image Process 16(8):2069–2079
Joly A, Buisson O (2005) Discriminant local features selection using efficient density estimation in a large database, in Proc. ACM Int. workshop on Multimedia information retrieval. New York, pp. 201–208
Joumaa H, Davoine F. An ICA based algorithm for video watermarking. In Proc. 2005 International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005), 2: 805–808
Kim C (2003) Content-based image copy detection. Signal Process Image Commun 18(3):169–184
Lewis AS, Knowles G (1992) Image compression using the 2-D wavelet transform. IEEE Trans Image Process 1(2):244–250
Lian S, Wang Z (2008) Collusion-traceable secure multimedia distribution based on controllable modulation. IEEE Trans Circuits Syst Video Technol 18(10):1462–1467
Lian S, Zhang Y (2009) Handbook of research on secure multimedia distribution. IGI Global (formerly Idea Group, Inc), March 2009
Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in compressed video data. IEEE Trans Circuits Syst Video Technol 17(6):774–778
Lian S, Kanellopoulos D, Ruffo G (2009) Recent advances in multimedia information system security. Informatica, Slovenian Society Informatika 33(1): 3-24
Liu Z, Lian S, Dong Y, Wang H (2008) Desynchronized image fingerprint for large scale distribution. Proceedings of 2008 IEEE International Conference on Image Processing (ICIP2008), IEEE Publisher, October 2008, pp. 409–412
Minghong P, Mandal MK, Basu A (2005) Image retrieval based on histogram of fractal parameters. IEEE Trans Multimedia 7(4):597–605
Mokhtarian F, Suomela R (1998) Robust image corner detection through curvature scale space. IEEE Trans Pattern Anal Mach Intell 20(12):1376–1381
Petitcolas FAP, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219–239
Podilchuk CI, Zeng W (1998) Image-adaptive watermarking using visual models. IEEE J Sel Areas Commun 16(4):525–539
Sebastien G, Alexandre W, Nathalie P (2003) Image or audiovisual sequence extraction method for extraction of an image or audiovisual sequence from an image flux, wherein images are analyzed to generate a reference index and this is compares with the current index. FR2843212
Takeya F (2004) System for searching illegitimate use of contents. JP2004112318
van Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark. Proc IEEE Int Conf Image Process 2:86–90, Austin, Texas
Wang ZJ, Wu M, Trappe W, Liu KJR (2004) Group-oriented fingerprinting for multimedia forensics. EURASIP J Appl Signal Process 4:2153–2173
Wang J, Lian S, Liu G, Dai Y (2008) Secure multimedia watermarking authentication in wavelet domain. SPIE J Electron Imaging 17(03):033010
Weinheimer J, Qi X, Qi J (2006) Towards a Robust Feature-Based Watermarking Scheme. 2006 IEEE International Conference on Image Processing, Oct. 2006, pp. 1401–1404
Wu Y (2005) Linear combination collusion attack and its application on an anti-collusion fingerprinting. IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005 (ICASSP ’05), 2:13–16
Wu M, Lin C, Chang C (2005) Image copy detection with rotating tolerance, In CIS 2005, Part I, LNAI 3801, Springer, pp. 464–469
Wu M, Trappe W, Wang ZJ, Liu R (2004) Collusion-resistant fingerprinting for multimedia. IEEE Signal Process Mag 21(2):15–27
Wu M-N, Lin C-C, Chang C (2006) A robust content-based copy detection scheme. Fund Inform 71(2–3):351–366, IOS Press
Xue G, Lu P (2004) A counter-geometric distortions data hiding scheme using double channels in color images. The 3rd IWDW. 42–54
Yang Z, Cohen FS (1999) Image registration and object recognition using affine invariants and convex hulls. IEEE Trans Image Processing 8(7):934–946
Acknowledgments
The work was partially supported by France Telecom’s Invenio project through the grant code of ILAB-PEK09-016, National Natural Science Foundation of China under Grant No. 70901039, National Postdoctoral Science Foundation of China under Grant No. 20090450144, and Jiangsu Postdoctoral Science Foundation under Grant No. 0901104C.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lian, S., Chen, X. & Wang, J. Content distribution and copyright authentication based on combined indexing and watermarking. Multimed Tools Appl 57, 49–66 (2012). https://doi.org/10.1007/s11042-010-0521-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-010-0521-3