Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks

  • Martin Schäler
  • Sandro Schulze
  • Ronny Merkel
  • Gunter Saake
  • Jana Dittmann
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7051)


Today, more and more data is available in digital form, ranging from normal text to multimedia data such as image or video data. Since some data is of high sensitivity or undergoes legal restrictions, it is important to obtain more reliable information about the data origin and its transformations, known as data provenance. Unfortunately, current approaches for data provenance neither support multimedia data nor provide mechanisms to ensure reliability of the provenance information. In this paper, we present an approach based on existing watermarking schemes evaluated by a database system. Hence, this approach ensures the reliability of multi media data (e.g., fingerprint data) and its corresponding provenance information. Furthermore, we show how this approach can be applied within a specific database, used for fingerprint verification.


Data Provenance Multi Media Data Invertible Watermarking 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Proc. Int. Conf. on Very Large Data Bases, pp. 155–166 (2002)Google Scholar
  2. 2.
    Ashbaugh, D.: Ridgeology – modern evaluative friction ridge identification. Journal of Forensic Identification 41(1), 16–64 (1991)MathSciNetGoogle Scholar
  3. 3.
    Buneman, P., Chapman, A., Cheney, J.: Provenance management in curated databases. In: Proc. Int. Conf. on Management of Data, pp. 539–550. ACM, New York (2006)Google Scholar
  4. 4.
    Buneman, P., Khanna, S., Tan, W.C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 316–330. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  5. 5.
    Buneman, P., Khanna, S., Tan, W.C.: On propagation of deletions and annotations through views. In: Proc. Symp. on Principles of Database Systems, pp. 150–158. ACM, New York (2002)Google Scholar
  6. 6.
    Celik, M., Sharma, G., Tekalp, A., Saber, E.: Lossless generalized-lsb data embedding. IEEE Transactions on Image Processing 14(2), 253–266 (2005)CrossRefGoogle Scholar
  7. 7.
    Cheney, J., Chiticariu, L., Tan, W.C.: Provenance in databases: Why, how, and where. Foundations and Trends in Databases 1(4), 379–474 (2009)CrossRefGoogle Scholar
  8. 8.
    Coltuc, D., Chassery, J.M.: Very fast watermarking by reversible contrast mapping. Signal Processing Letters 14(4), 255–258 (2007)CrossRefGoogle Scholar
  9. 9.
    Cox, I., Miller, M., Bloom, J.: Digital Watermarking: Principles and Practice. Morgan Kaufmann, San Francisco (2001)Google Scholar
  10. 10.
    Cui, Y., Widom, J.: Practical lineage tracing in data warehouses. In: Proc. Int. Conf. on Data Engineering, pp. 367–378. IEEE, Los Alamitos (2000)Google Scholar
  11. 11.
    Cui, Y., Widom, J., Wiener, J.: Tracing the lineage of view data in a data warehousing environment. ACM Trans. on Database Systems 25(2), 179–227 (2000)CrossRefGoogle Scholar
  12. 12.
    Dittmann, J., Wohlmacher, P., Nahrstedt, K.: Using cryptografic and watermarking algorithms. IEEE Multimedia 8(4), 54–65 (2001)CrossRefGoogle Scholar
  13. 13.
    Dubey, S., Anna, T., Shakher, C., Mehta, D.: Fingerprint detection using full-field swept-source optical coherence tomography. Applied Physics Letters 91(18), 1–3 (2007)CrossRefGoogle Scholar
  14. 14.
    Feng, J., Lin, I., Tsai, C., Chu, Y.: Reversible watermarking: Current status and key issues. International Journal of Network Security 2(3), 161–171 (2006)Google Scholar
  15. 15.
    Galton, F.: Fingerprints. MacMillan and Co., NYC (1892)Google Scholar
  16. 16.
    Glavic, B., Dittrich, K.: Data provenance: A categorization of existing approaches. In: GI-Fachtagung für Datenbanksysteme (BTW), pp. 227–241 (2007)Google Scholar
  17. 17.
    Guo, H., Li, Y., Jajodia, S.: Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci. 177(1), 281–298 (2007)CrossRefGoogle Scholar
  18. 18.
    Gupta, A.: Data provenance. In: Encyclopedia of Database Systems, p. 608. Springer, Heidelberg (2009)Google Scholar
  19. 19.
    Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. of IEEE 87(7), 1079–1107 (2002)CrossRefGoogle Scholar
  20. 20.
    Kuivalainen, K., Peiponen, K.E., Myller, K.: Application of a diffractive element-based sensor for detection of latent fingerprints from a curved smooth surface. Measurement Sci. and Tech. 20(7), 207–211 (2009)CrossRefGoogle Scholar
  21. 21.
    Lin, S., Engheta, N., Pugh Jr., E., Yemelyanov, K.: Polarization- and specular-reflection-based, non-contact latent fingerprint imaging and lifting. Journal of Opt. Soc. of America 23(9), 2137–2153 (2006)CrossRefGoogle Scholar
  22. 22.
    Merkel, R., Kraetzer, C., Dittmann, J., Vielhauer, C.: Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints - a capacity study for forensic approaches. To Appear in Int’l. Conf. on Digital Signal Processing (2011)Google Scholar
  23. 23.
    Simmhan, Y., Plale, B., Gannon, D.: A survey of data provenance techniques. Tech. Rep. IUB-CS-TR618, Department of Computer Science, Indiana University, Bloomington (2005)Google Scholar
  24. 24.
    Sion, R.: Proving ownership over categorical data. In: Proc. Int. Conf. on Data Engineering, pp. 584–595 (2004)Google Scholar
  25. 25.
    Sion, R.: Database watermarking for copyright protection. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, pp. 297–328. Springer, US (2008)CrossRefGoogle Scholar
  26. 26.
    Tan, W.C.: Research problems in data provenance. IEEE Data Eng. Bull. 27(4), 42–52 (2004)Google Scholar
  27. 27.
    Tan, W.C.: Provenance in databases: Past, current, and future. IEEE Data Eng. Bull. 32(4), 3–12 (2007)Google Scholar
  28. 28.
    Tian, J.: Reversible data embedding using a difference expansion. Circuits and Systems for Video Technology 13(8), 890–896 (2003)CrossRefGoogle Scholar
  29. 29.
    Tsai, W., Wei, X., Chen, Y., Paul, R., Chung, J.Y., Zhang, D.: Data provenance in soa: Security, reliability, and integrity. Service Oriented Computing and Applications 1, 223–247 (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Martin Schäler
    • 1
  • Sandro Schulze
    • 1
  • Ronny Merkel
    • 1
  • Gunter Saake
    • 1
  • Jana Dittmann
    • 1
  1. 1.School of Computer ScienceUniversity of MagdeburgGermany

Personalised recommendations