Skip to main content
Log in

Image watermarking via wavelet approach and face biometrics

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In this paper, we consider a new highly-performing system to establish the intellectual property of a file by using advanced Information Fusion (IF) techniques based on Face Biometrics (FB) and Wavelet Multiresolution Analysis (WMA). IF is used in different depending on the fact that it can be a textual file, an image or multimedial; indeed, the further step consists in creating blue biometric codes with different watermarking mechanisms based on: i) face features, ii) wavelets and wavelet packets respectively. It seems clear that such a system can be useful for all that concerns files/contents distributed online for what regards both the intellectual property and the access/modification/use of information. At the end we also show a new method, based on information entropy, to track the access and use of a specific file by different users. Indeed, thanks to our approach we can also know the sequence of the users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Ardovini A, Cinque L, Sangineto E (2008) Identifying elephant photos by multi-curve matching. Pattern Recognit 41:1867–1877

    Article  MATH  Google Scholar 

  • Agreste S (2002–2003) Tecniche di Watermarking mediante wavelet, Thesis in computer science, A.A. supervisor L. Puccio

  • Bartolini F, Cardelli R, Cappellini V, De Rosa A, Piva A (2002) Digital watermarking: a solution to electronic copyright management system requirements. Dipartimento di Elettronica e Telecomunicazioni.Universita’ di Firenze. http://Medicif.org/DigLibrary/Stateart/Ipr/Piva/PivaDoc.Html

  • Bartolini F, Caldelli R, Cappellini V, De Rosa A, Piva A (2001) Tecnologie di marchiatura elettronica per i Beni Culturali. Alta Frequenza Rivista di Elettronica 13(2)

  • Barni M, Bartolini F, Cappellini V, Piva A (1997) Robust watermarking of still images for copyright protection. Department of Electronic Engineering, University of Firenze, Florence

  • Barni M, Bartolini F, Cappellini V, Lippie A, Piva A (1999) Proceedings of SPIE vol. 3657, security and watermarking of multimedia contents, electronic imaging ’99, San Jose

  • Bartlow N, Kalka N, Cukic B, Ross A (2007) Protecting iris images through asymmetric digital watermarking. In: 2007 IEEE workshop on automatic identification advanced technologies, pp 192–197

  • Bhatnagar G, Raman B, Swaminathan K (2008) DWT-SVD based dual watermarking scheme. In: First international conference on the applications of digital information and web technologies, 2008. ICADIWT 2008, pp 526–531

  • Bender W, Gruhl D, Morimoto N (1995) Massachusets Institute of Technologies Media Laboratory. Techniques for data hiding. In: Proceedings of the SPIE, San Jose

  • Cinque L, Iovane G, Sangineto E (2008) Comparing SIFT and LDA based face recognition approaches. J Discret Math Sci Cryptogr 11(6):685–704

    MATH  Google Scholar 

  • Corvi M, Picchiotti G (1997) Wavelet-based image watermarking for copyright protection. Proc SCIA, pp 157–164

  • Cox IJ, Kilian J, Leightone T, Shamoon T (1996) Secure Spread Spectrum Watermarking for Multimedia. In: Proc IEEE Int Conf Image Process (Switzerland) 16–19 September 1996, III:243–246

  • Chang E-C, Orchard M (2000) Geometric properties of watermarking schemes. In: Proceedings of the international conference on image processing, 2000, vol 3, pp 714–717

  • Cheng-Yaw L, Beng-Jin TA, Connie T (2008) Fusion of LSB and DWT biometric watermarking for offline handwritten signature. In: Proceedings of the 2008 Congress on image and signal processing, CISP ’08, 5:702–708

  • Coifman R, Meyer Y, Quake S, Wickerhauser V (1990) Signal processing and compression with wave packets. Numerical Algorithms Research Group, Yale University New Haven

  • Daubechies I (1988) Orthonormal Bases of Compactly Supported Wavelets. Commun Pure Appl Math 41:909–996

    Article  MathSciNet  MATH  Google Scholar 

  • Daubechies I (1992) Ten lectures on wavelets, SIAM

  • Dong P, Brankov JG, Galatsanos NP, Yang Y, Davoine F (2005) Digital watermarking robust to geometric distortions. IEEE Trans Image Process 14(12):2140–2150

    Article  Google Scholar 

  • Fan Z, Hongbin Z (2004) Capacity and reliability of digital watermarking. In: International conference on business of electronic product reliability and liability, 2004, pp 162–165

  • Fan K, Pei Q, Mo W, Zhao X, Li X (2006) A novel authentication mechanism for improving the creditability of DRM system. In: International conference on communication technology, 2006. ICCT ’06. 27–30 November 2006, pp 1–4. doi:10.1109/ICCT.2006.341834

  • Ghazy RA, El-Fishawy NA, Hadhoud MM, Dessouky MI, El-Samie FEA (2007) An efficient block-by-block SVD-based image watermarking scheme. In: National radio science conference, 2007, NRSC 2007, pp 1–9

  • Geronimo JS, Hardin DP, Massopust PR (1994) Fractal function and wavelet expansions based on several scaling functions. J Approx Theory 78:373–401

    Article  MathSciNet  MATH  Google Scholar 

  • Giovinazzo S (2001/2002) Tutela del diritto d’autore dell’immagine digitale, watermaking e tecniche di attacco. Thesis in computer science, A.A.2001/2002, supervisor L. Puccio

  • Hoang T, Tran D, Sharma D (2008) Bit priority-based biometric watermarking communications and electronics, 2008. In: Second international conference on ICCE 2008, pp 191–195, 4–6 June 2008

  • Iovane G, Giordano P, Ingenito G, Leone M, Nocerino A (2009) Biometric watermarking via wavelet approach, reverse engineering in info-security and dematerialization of public administration. J Discret Math Sci Cryptogr

  • Jung S, Lee D, Lee S, Paik J (2007) Fingerprint watermarking for H.264 streaming media. Frontiers in the convergence of bioscience and information technologies, 2007. FBIT 2007, pp 671–675, 11–13 October 2007

  • Jung S, Lee D, Lee S, Paik J (2007) Biometric data-based robust watermarking scheme of video streams. In: 6th international conference on information, communications & signal processing, 2007, pp 1–5, 10–13, December 2007

  • Langelaar GC, van der Lubbe JCA, Biemond J (2010) Copy Protection for Multimedia Data based on Labeling Techniques. Department of Electrical Engineering, Information Theory Group, Delft University of Technologies, Netherland

  • Lee H, Rhee K (2006) Reversible data embedding for tamper-proof watermarks. In: First international conference on innovative computing, information and control, 2006. ICICIC ’06, vol 3, pp 487–490

  • Llinas J, Bowman C, Rogova G, Steinberg A, Waltz E, White F (2004) Revisiting the JDL data fusion model II. In: 7th international conference on information fusion, Stockholm, Sweden

  • Lin ET, Delp EJ (2004) Temporal synchronization in video watermarking. IEEE Trans Signal Process 52(10):3007–3022

    Article  Google Scholar 

  • Low CY, Teoh ABJ (2007) Member, IEEE, Connie Tee. A preliminary study on biometric watermarking for offline handwritten signature. Telecommunications and Malaysia International Conference on Communications, 2007. ICT-MICC 2007. In: IEEE International Conference on 14–17 May 2007 Page(s):691–696. doi:10.1109/ICTMICC.2007.4448568

  • Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110

    Google Scholar 

  • Lumini A, Maio D (2000) A wavelet-based image watermarking scheme. In: Proceedings of international conference on information technology: coding and computing

  • Mallat S (1989) A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans Pattern Anal Mach Intell 11:674–693

    Article  MATH  Google Scholar 

  • Low C-Y, Teoh ABJ, Tee C (2008) Support vector machines (SVM)-based biometric watermarking for offline handwritten signature. In: Proceedings of the 3rd IEEE industrial electronics and applications, 2008. ICIEA 2008, pp 2095–2100, no. 3–5, June 2008

  • Mallat S, Zhang Z (1993) Matching pursuits with time–frequency dictionaries. IEEE Trans Signal Process, pp 3397–3415

  • Misiti M, Misiti Y, Oppenheim G, Poggi JM (1996) Wavelet toolbox for use with MATLAB. The Math Works Inc., Natick

  • Nikolaidis N, Pitas I (1998) Robust Image Watermarking in the Spatial Domain. Signal Proc 66(3):385–403

    Google Scholar 

  • Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding–a survey. Proc IEEE 87(7):1062–1078

    Google Scholar 

  • Peticolas FAP, Anderson RJ, Kuhn MG (2003) Attacks on copyright marking systems. In: Davi Aucsmith (ed) Second workshop on information hiding, LNCS

  • Pitas I (1996) A method for signature casting on digital images. Int Conf Image Proc Proc, ICIP 96, 3:215:218

    Google Scholar 

  • Pitas I, Kaskalis T (1996) Signature casting on digital images. In: Proceedings of the IEEE workshop on nonlinear signal and image processing, NeosMarmaras, June 1995

  • Piva A, Barni M, Bartolini F, Cappellini V (1997) DCT-based watermark recovering without resorting to the uncorrupted original image. Department of Electronic Engineering, University of Firenze, Florence

  • Rajibul Islam Md, Shohel Sayeed Md, Andrews S (2007) Multimodality to improve security and privacy in fingerprint authentication system. Int Conf Intell Adv Syst ICIAS 2007, pp 753–757

  • Rathore SA, Gilani SAM, Mumtaz A, Jameel T, Sayyed A (2007) Enhancing invisibility and robustness of DWT based video watermarking scheme for copyright protection. In: International conference on information and emerging technologies, 2007, ICIET 2007, pp 1–5

  • Sang J, Alam MS (2008) Fragility and robustness of binary-phase-only-filter-based fragile/semifragile digital image watermarking. IEEE Trans Instrum Meas 57(3):595–606

    Article  Google Scholar 

  • Satonaka T (2002) Biometric watermark authentication with multiple verification rule. Neural networks for signal processing, 2002. In: Proceedings of the 2002 12th IEEE, pp 597–606

  • Smart P (2005) Knowledge-intensive fusion for situational awareness. dal progetto AKTiveSA, report DTC/WP270/Requirements, University of Southampton, Southampton. http://eprints.ecs.soton.ac.uk/11066/1/Requirements_for_Knowledge_Awarenessv8.pdf

  • Steinebach M, Hauer E, Wolf P (2007) Efficient watermarking strategies. Third international conference on automated production of cross media content for multi-channel distribution, 2007, AXMEDIS ’07, pp 65–71

  • Steinberg A, Bowman C (2004) Rethinking the JDL data fusion levels. Paper presented at the national symposium on sensor and data fusion

  • Steinberg A, Bowman C, White F (1999) Revisions to the JDL data fusion model. Paper presented at the sensor fusion: architectures, algorithms and applications III conference, Orlando

  • Steinberg N, Bowman CL, White F (1998) Revisions to the JDL data fusion model. Paper presented at the Joint NATO/IRIS Conference, Quebec City

  • Su JK, Girod B (1999) Power-spectrum condition for energy-efficient watermarking. In: Proceedings of the international conference on image processing, 1999. ICIP 1999, vol 1, pp 301–305

  • van Schyndel RG, Tirkel AZ, Osborne CF (1994) A Digital Watermark. Proc IEEE Int Conf Image Process II:86–90

  • Viola P, Jones M (2001) Robust real-time object detection. In: Proceedings of 2nd international workshop on statistical and computational theories of vision

  • Wickerhauser MV (1992) Acoustic signal compression with wavelet packets. In: Chui CK (ed) Wavelets: a tutorial in theory and applications. Academic press, New York, pp 679-700

  • Wickerhauser MV (1994) Comparison of picture compression methods: wavelet, wavelet packet, and local cosine transform coding. In: Chui CK, Montefusco L, Puccio L (eds) Wavelets: theory, algorithm and application. Academic Press, Inc., London

  • Wickerhauser MV, Farge M, Goirand E, Wesfreid E, Cubillo E (1994) Efficiency comparison of wavelet packet and adapted local cosine bases for compression of a two-dimension turbolent flow. In: Chui CK, Montefusco L, Puccio L (eds)Wavelets: theory, algorithm and application, Academic Press, Inc., London

  • Wong PHW, Au OC, Yeung YM (2003) Novel blind multiple watermarking technique for images. IEEE Trans Circuits Syst Video Technol 13(8):813–830

    Article  Google Scholar 

  • Xie R, Wu K, Du J, Li C (2007) Survey of public key digital watermarking systems. In: Eighth ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing, 2007. SNPD 2007, vol 2, pp 439–443

  • Zhao J, Koch E (1995) Embedding Robust Labels into Images for Copyright Protection. In: Proceedings of the international Congress on intellectual property rights for specialized information, Knowledge and New Technologies, Vienna

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Iovane.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Iovane, G., Giordano, P. & Borysenko, S.D. Image watermarking via wavelet approach and face biometrics. J Ambient Intell Human Comput 2, 91–101 (2011). https://doi.org/10.1007/s12652-010-0031-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-010-0031-1

Keywords

Navigation