Multimedia Tools and Applications

, Volume 71, Issue 3, pp 1249–1262 | Cite as

Image betrayal checking based on organization’s watermarking in Internet

  • Yongsheng YuEmail author
  • Jinshu Cheng
  • Zhihua Wei
  • Ruhan He


There is a growing need for confidential institutions to actively check the documents in Internet for detecting some leaked confidential images. This paper presents an efficient method of active image betrayal checking based on a new type of watermarking in addition to the user-specific fingerprint. The implemented organization’s watermarking, as a ‘fingerprint’ for a group of staffs, with a codeword length far shorter than that of the user-specific fingerprint, is extracted from a suspected image at the first stage of betrayal checking, for the purpose of reducing the number of suspected images by a great deal. Then, only the remaining suspected images are subjected to the time-consuming user-specific fingerprint checking. Experimental tests confirmed the improved efficiency of this method.


Betrayal checking Digital fingerprint Organization’s watermarking Trace betrayer 



This paper is supported by National Natural Science Foundation of China (No.61170093) and China Postdoctoral Science Foundation (No.20110491149).


  1. 1.
    Andoni A, Indyk P (2006) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Foundations of Computer Science, 459–468Google Scholar
  2. 2.
    Barg A, Blakley GR, Kabatiansky GA (2003) Digital fingerprinting codes: problem statements, constructions, identification of traitors. IEEE Trans Inf Theory 49(4):852–865CrossRefzbMATHMathSciNetGoogle Scholar
  3. 3.
    Boneh D, Shaw J (1998) Collusion-secure fingerprinting for digital data. IEEE Trans Inf Theory 44:1897–1905CrossRefzbMATHMathSciNetGoogle Scholar
  4. 4.
    Cox I, Kilian J, Leighton F, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRefGoogle Scholar
  5. 5.
    Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE J Sel Area Comm 16(4):587–593CrossRefGoogle Scholar
  6. 6.
    Datar M, Immorlica N, Indyk P, Mirrokni VS (2004) Locality-sensitive hashing scheme based on p-stable distributions, In Symposium on Computational Geometry (SCG), 253–262Google Scholar
  7. 7.
    Datta R, Joshi D, Li J, Wang JZ (2008) Image retrieval: ideas, influences, and trends of the new age. ACM Trans Comput Surv 40(2):1–60CrossRefGoogle Scholar
  8. 8.
    Deng F, Yu Y Counting the number of intransitive triangles for near duplicate detection, to be publishedGoogle Scholar
  9. 9.
    Fernández M, Soriano M (2002) Fingerprinting concatenated codes with efficient identification, Information Security (ISC’02), LNCS 2433, Springer, 459–470Google Scholar
  10. 10.
    Hexmoor H, Wilson S, Bhattaram S (2006) A theoretical inter-organizational trust-based security model. Knowl Eng Rev 21(2):127–161CrossRefGoogle Scholar
  11. 11.
    Hsu CT, Wu JL (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1):58–68CrossRefGoogle Scholar
  12. 12.
    Hu A, Chen N (2008) A blind watermarking algorithm for color image based on wavelet transform and Fourier transform. Proceedings of The 9th International Conference for Young Computer Scientists (ICYCS 2008), vol. 2, Zhang Jia Jie, China, 1453–1458Google Scholar
  13. 13.
    Kilian J, Leighton T, Matheson LR, Shamoon TG, Tarjan RE, Zane F (1998) Resistance of digital watermarks to collusive attacks, Tech. Rep. TR-585-98, Dept. Compute. Sci., Princeton Univ., 71–271Google Scholar
  14. 14.
    Li G, Pei S, Chen G, Cao W, Wu B (2009) A self-embedded watermarking scheme based on relationship function of corresponding inter-blocks DCT coefficient, Proceedings of the 2009 13th International Conference on Computer Supported Cooperative Work in Design, Santiago, 107–112Google Scholar
  15. 15.
    Li Z, Trappe W (2005) Collusion-resistant fingerprints from WBE sequence sets. In Proc. IEEE ICC 2005, Seoul, Korea, 1336–1340Google Scholar
  16. 16.
    O’Ruanaidh JJK, Pun T (1997) Rotation, Scale and translation invariant digital image watermarking, In proceedings of the International conference on Image Processing, Vol, 536, Santa Barbara, CA, U S A, 536–539Google Scholar
  17. 17.
    Piva A (1997) DCT-based watermark recovering without resorting to the uncorrupted original images. Proc ICIP 1:520–523Google Scholar
  18. 18.
    Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRefGoogle Scholar
  19. 19.
    Torralba A, Fergus R, Freeman WT (2008) 80 million tiny images: a large data set for nonparametric object and scene recognition. IEEE Trans Pattern Anal Mach Intell 30(11):1958–1970CrossRefGoogle Scholar
  20. 20.
    Wang HJM, Su PC, Kou CCJ (1998) Wavelet based digital image watermarking. Opt Express 13(112):491–496CrossRefGoogle Scholar
  21. 21.
    Wang ZJ, Wu M, Zhao H, Trappe W, Liu KJR (2005) Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans Image Process 14(6):804–821CrossRefGoogle Scholar
  22. 22.
    Yan Y, Cao W, Li S (2009) Block-based adaptive image watermarking scheme using Just Noticeable Difference. Proceedings of 2009 IEEE International Workshop on Imaging Systems and Techniques(IST ’09.), Shenzhen, 377–380Google Scholar
  23. 23.
    Yang W-M, Jin Z (2009) A watermarking algorithm based on wavelet and cosine transform for color image. Proceedings of 2009 First International Workshop on Education Technology and Computer Science, vol. 2, Wuhan, Hubei, China, 899–903Google Scholar
  24. 24.
    Yu Y, Chen X (2010) Image betrayal checking based on the digital fingerprint of images on the Internet. J Southwest Jiaotong Univ 18(2):149–159Google Scholar
  25. 25.
    Zane F (2005) Efficient watermark detection and collusion security, In Proc. Financial Cryptography, vol. 1962, 21–32Google Scholar
  26. 26.
    Zhu Y, Feng DG, Yang YT (2005) Convolutional Fingerprinting Information Codes for Collusion Security, in Proceedings of the SPIE conference on Mathematics of Data/Image Coding, Compression, and Encryption VIII with Applications, San Diego, 266–274Google Scholar

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  • Yongsheng Yu
    • 1
    Email author
  • Jinshu Cheng
    • 1
  • Zhihua Wei
    • 1
  • Ruhan He
    • 2
  1. 1.The Green Building Materials and Manufacturing Engineering Research Center of Ministry of EducationWuhan University of TechnologyWuhanChina
  2. 2.College of Mathematics & Computer ScienceWuhan Textile UniversityWuhanChina

Personalised recommendations