Abstract
In this paper, we consider a new highly-performing system to establish the intellectual property of a file by using advanced Information Fusion (IF) techniques based on Face Biometrics (FB) and Wavelet Multiresolution Analysis (WMA). IF is used in different depending on the fact that it can be a textual file, an image or multimedial; indeed, the further step consists in creating blue biometric codes with different watermarking mechanisms based on: i) face features, ii) wavelets and wavelet packets respectively. It seems clear that such a system can be useful for all that concerns files/contents distributed online for what regards both the intellectual property and the access/modification/use of information. At the end we also show a new method, based on information entropy, to track the access and use of a specific file by different users. Indeed, thanks to our approach we can also know the sequence of the users.
Similar content being viewed by others
References
Ardovini A, Cinque L, Sangineto E (2008) Identifying elephant photos by multi-curve matching. Pattern Recognit 41:1867–1877
Agreste S (2002–2003) Tecniche di Watermarking mediante wavelet, Thesis in computer science, A.A. supervisor L. Puccio
Bartolini F, Cardelli R, Cappellini V, De Rosa A, Piva A (2002) Digital watermarking: a solution to electronic copyright management system requirements. Dipartimento di Elettronica e Telecomunicazioni.Universita’ di Firenze. http://Medicif.org/DigLibrary/Stateart/Ipr/Piva/PivaDoc.Html
Bartolini F, Caldelli R, Cappellini V, De Rosa A, Piva A (2001) Tecnologie di marchiatura elettronica per i Beni Culturali. Alta Frequenza Rivista di Elettronica 13(2)
Barni M, Bartolini F, Cappellini V, Piva A (1997) Robust watermarking of still images for copyright protection. Department of Electronic Engineering, University of Firenze, Florence
Barni M, Bartolini F, Cappellini V, Lippie A, Piva A (1999) Proceedings of SPIE vol. 3657, security and watermarking of multimedia contents, electronic imaging ’99, San Jose
Bartlow N, Kalka N, Cukic B, Ross A (2007) Protecting iris images through asymmetric digital watermarking. In: 2007 IEEE workshop on automatic identification advanced technologies, pp 192–197
Bhatnagar G, Raman B, Swaminathan K (2008) DWT-SVD based dual watermarking scheme. In: First international conference on the applications of digital information and web technologies, 2008. ICADIWT 2008, pp 526–531
Bender W, Gruhl D, Morimoto N (1995) Massachusets Institute of Technologies Media Laboratory. Techniques for data hiding. In: Proceedings of the SPIE, San Jose
Cinque L, Iovane G, Sangineto E (2008) Comparing SIFT and LDA based face recognition approaches. J Discret Math Sci Cryptogr 11(6):685–704
Corvi M, Picchiotti G (1997) Wavelet-based image watermarking for copyright protection. Proc SCIA, pp 157–164
Cox IJ, Kilian J, Leightone T, Shamoon T (1996) Secure Spread Spectrum Watermarking for Multimedia. In: Proc IEEE Int Conf Image Process (Switzerland) 16–19 September 1996, III:243–246
Chang E-C, Orchard M (2000) Geometric properties of watermarking schemes. In: Proceedings of the international conference on image processing, 2000, vol 3, pp 714–717
Cheng-Yaw L, Beng-Jin TA, Connie T (2008) Fusion of LSB and DWT biometric watermarking for offline handwritten signature. In: Proceedings of the 2008 Congress on image and signal processing, CISP ’08, 5:702–708
Coifman R, Meyer Y, Quake S, Wickerhauser V (1990) Signal processing and compression with wave packets. Numerical Algorithms Research Group, Yale University New Haven
Daubechies I (1988) Orthonormal Bases of Compactly Supported Wavelets. Commun Pure Appl Math 41:909–996
Daubechies I (1992) Ten lectures on wavelets, SIAM
Dong P, Brankov JG, Galatsanos NP, Yang Y, Davoine F (2005) Digital watermarking robust to geometric distortions. IEEE Trans Image Process 14(12):2140–2150
Fan Z, Hongbin Z (2004) Capacity and reliability of digital watermarking. In: International conference on business of electronic product reliability and liability, 2004, pp 162–165
Fan K, Pei Q, Mo W, Zhao X, Li X (2006) A novel authentication mechanism for improving the creditability of DRM system. In: International conference on communication technology, 2006. ICCT ’06. 27–30 November 2006, pp 1–4. doi:10.1109/ICCT.2006.341834
Ghazy RA, El-Fishawy NA, Hadhoud MM, Dessouky MI, El-Samie FEA (2007) An efficient block-by-block SVD-based image watermarking scheme. In: National radio science conference, 2007, NRSC 2007, pp 1–9
Geronimo JS, Hardin DP, Massopust PR (1994) Fractal function and wavelet expansions based on several scaling functions. J Approx Theory 78:373–401
Giovinazzo S (2001/2002) Tutela del diritto d’autore dell’immagine digitale, watermaking e tecniche di attacco. Thesis in computer science, A.A.2001/2002, supervisor L. Puccio
Hoang T, Tran D, Sharma D (2008) Bit priority-based biometric watermarking communications and electronics, 2008. In: Second international conference on ICCE 2008, pp 191–195, 4–6 June 2008
Iovane G, Giordano P, Ingenito G, Leone M, Nocerino A (2009) Biometric watermarking via wavelet approach, reverse engineering in info-security and dematerialization of public administration. J Discret Math Sci Cryptogr
Jung S, Lee D, Lee S, Paik J (2007) Fingerprint watermarking for H.264 streaming media. Frontiers in the convergence of bioscience and information technologies, 2007. FBIT 2007, pp 671–675, 11–13 October 2007
Jung S, Lee D, Lee S, Paik J (2007) Biometric data-based robust watermarking scheme of video streams. In: 6th international conference on information, communications & signal processing, 2007, pp 1–5, 10–13, December 2007
Langelaar GC, van der Lubbe JCA, Biemond J (2010) Copy Protection for Multimedia Data based on Labeling Techniques. Department of Electrical Engineering, Information Theory Group, Delft University of Technologies, Netherland
Lee H, Rhee K (2006) Reversible data embedding for tamper-proof watermarks. In: First international conference on innovative computing, information and control, 2006. ICICIC ’06, vol 3, pp 487–490
Llinas J, Bowman C, Rogova G, Steinberg A, Waltz E, White F (2004) Revisiting the JDL data fusion model II. In: 7th international conference on information fusion, Stockholm, Sweden
Lin ET, Delp EJ (2004) Temporal synchronization in video watermarking. IEEE Trans Signal Process 52(10):3007–3022
Low CY, Teoh ABJ (2007) Member, IEEE, Connie Tee. A preliminary study on biometric watermarking for offline handwritten signature. Telecommunications and Malaysia International Conference on Communications, 2007. ICT-MICC 2007. In: IEEE International Conference on 14–17 May 2007 Page(s):691–696. doi:10.1109/ICTMICC.2007.4448568
Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110
Lumini A, Maio D (2000) A wavelet-based image watermarking scheme. In: Proceedings of international conference on information technology: coding and computing
Mallat S (1989) A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans Pattern Anal Mach Intell 11:674–693
Low C-Y, Teoh ABJ, Tee C (2008) Support vector machines (SVM)-based biometric watermarking for offline handwritten signature. In: Proceedings of the 3rd IEEE industrial electronics and applications, 2008. ICIEA 2008, pp 2095–2100, no. 3–5, June 2008
Mallat S, Zhang Z (1993) Matching pursuits with time–frequency dictionaries. IEEE Trans Signal Process, pp 3397–3415
Misiti M, Misiti Y, Oppenheim G, Poggi JM (1996) Wavelet toolbox for use with MATLAB. The Math Works Inc., Natick
Nikolaidis N, Pitas I (1998) Robust Image Watermarking in the Spatial Domain. Signal Proc 66(3):385–403
Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding–a survey. Proc IEEE 87(7):1062–1078
Peticolas FAP, Anderson RJ, Kuhn MG (2003) Attacks on copyright marking systems. In: Davi Aucsmith (ed) Second workshop on information hiding, LNCS
Pitas I (1996) A method for signature casting on digital images. Int Conf Image Proc Proc, ICIP 96, 3:215:218
Pitas I, Kaskalis T (1996) Signature casting on digital images. In: Proceedings of the IEEE workshop on nonlinear signal and image processing, NeosMarmaras, June 1995
Piva A, Barni M, Bartolini F, Cappellini V (1997) DCT-based watermark recovering without resorting to the uncorrupted original image. Department of Electronic Engineering, University of Firenze, Florence
Rajibul Islam Md, Shohel Sayeed Md, Andrews S (2007) Multimodality to improve security and privacy in fingerprint authentication system. Int Conf Intell Adv Syst ICIAS 2007, pp 753–757
Rathore SA, Gilani SAM, Mumtaz A, Jameel T, Sayyed A (2007) Enhancing invisibility and robustness of DWT based video watermarking scheme for copyright protection. In: International conference on information and emerging technologies, 2007, ICIET 2007, pp 1–5
Sang J, Alam MS (2008) Fragility and robustness of binary-phase-only-filter-based fragile/semifragile digital image watermarking. IEEE Trans Instrum Meas 57(3):595–606
Satonaka T (2002) Biometric watermark authentication with multiple verification rule. Neural networks for signal processing, 2002. In: Proceedings of the 2002 12th IEEE, pp 597–606
Smart P (2005) Knowledge-intensive fusion for situational awareness. dal progetto AKTiveSA, report DTC/WP270/Requirements, University of Southampton, Southampton. http://eprints.ecs.soton.ac.uk/11066/1/Requirements_for_Knowledge_Awarenessv8.pdf
Steinebach M, Hauer E, Wolf P (2007) Efficient watermarking strategies. Third international conference on automated production of cross media content for multi-channel distribution, 2007, AXMEDIS ’07, pp 65–71
Steinberg A, Bowman C (2004) Rethinking the JDL data fusion levels. Paper presented at the national symposium on sensor and data fusion
Steinberg A, Bowman C, White F (1999) Revisions to the JDL data fusion model. Paper presented at the sensor fusion: architectures, algorithms and applications III conference, Orlando
Steinberg N, Bowman CL, White F (1998) Revisions to the JDL data fusion model. Paper presented at the Joint NATO/IRIS Conference, Quebec City
Su JK, Girod B (1999) Power-spectrum condition for energy-efficient watermarking. In: Proceedings of the international conference on image processing, 1999. ICIP 1999, vol 1, pp 301–305
van Schyndel RG, Tirkel AZ, Osborne CF (1994) A Digital Watermark. Proc IEEE Int Conf Image Process II:86–90
Viola P, Jones M (2001) Robust real-time object detection. In: Proceedings of 2nd international workshop on statistical and computational theories of vision
Wickerhauser MV (1992) Acoustic signal compression with wavelet packets. In: Chui CK (ed) Wavelets: a tutorial in theory and applications. Academic press, New York, pp 679-700
Wickerhauser MV (1994) Comparison of picture compression methods: wavelet, wavelet packet, and local cosine transform coding. In: Chui CK, Montefusco L, Puccio L (eds) Wavelets: theory, algorithm and application. Academic Press, Inc., London
Wickerhauser MV, Farge M, Goirand E, Wesfreid E, Cubillo E (1994) Efficiency comparison of wavelet packet and adapted local cosine bases for compression of a two-dimension turbolent flow. In: Chui CK, Montefusco L, Puccio L (eds)Wavelets: theory, algorithm and application, Academic Press, Inc., London
Wong PHW, Au OC, Yeung YM (2003) Novel blind multiple watermarking technique for images. IEEE Trans Circuits Syst Video Technol 13(8):813–830
Xie R, Wu K, Du J, Li C (2007) Survey of public key digital watermarking systems. In: Eighth ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing, 2007. SNPD 2007, vol 2, pp 439–443
Zhao J, Koch E (1995) Embedding Robust Labels into Images for Copyright Protection. In: Proceedings of the international Congress on intellectual property rights for specialized information, Knowledge and New Technologies, Vienna
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Iovane, G., Giordano, P. & Borysenko, S.D. Image watermarking via wavelet approach and face biometrics. J Ambient Intell Human Comput 2, 91–101 (2011). https://doi.org/10.1007/s12652-010-0031-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-010-0031-1