Advertisement

Issues in Multimedia Databases: Coding for Content-Based Image Retrieval and Digital Copyright Protection

  • Mitchell D. Swanson
  • Ahmed H. Tewfik
Part of the The IMA Volumes in Mathematics and its Applications book series (IMA, volume 107)

Abstract

This paper addresses two key issues in multimedia databases: efficient management of large image libraries and digital copyright protection. We introduce an image representation which efficiently stores a large collection of images while simultaneously providing content-based access to the images. The new algorithm is designed to minimize a weighted sum of the expected compressed image sizes and the expected query response time. The system supports several advanced features, including compressed data modification and a progressive refinement retrieval based on low complexity bit pattern matching. The second issue we address is encoding hidden copyright information, i.e., a digital watermark, into digital data. We introduce a technique to watermark multimedia using the masking properties of the human auditory and visual systems. The watermarking technique is shown to be extremely robust to data distortions, including low bit rate coding and colored noise.

Key words

Image databases content-based access database browsing digital copyright protection digital watermark masking 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    M. Flickner, H. Sawhney, W. Niblack, J. Ashley, Q. Huang, B. Dom, M. Gorkani, J. Hafner, D. Lee, D. Petkovic, D. Steele, and P. Yanker, “Query by Image and Video Content: The QBIC System,” Computer, vol. 28, pp. 23–32, Sept. 1995.CrossRefGoogle Scholar
  2. [2]
    A. E. Cawkell, “Picture Queries and Picture Databases,” Journal of Info. Sciences, vol. 19, pp. 409–423, 1993.CrossRefGoogle Scholar
  3. [3]
    A. Pentland, R. W. Picard, and S. Sclaroff, “Photobook: Content-Based Manipulation of Image Databases.” MIT Media Lab Tech Report No. 19 255, 1993.Google Scholar
  4. [4]
    C. E. Jacobs, A. Finkelstein, and D. H. Salesin, “Fast Multiresolution Image Querying,” in Proc. ACM SIGGRAPH Conference on Computer Graphics, (Los Angeles, CA), pp. 19 277–286, 1995.Google Scholar
  5. [5]
    B. S. Manjunath and W. Y. Ma, “Browsing Large Satellite and Aerial Photographs,” in Proc. IEEE Int. Conf. on Image Proc., (Lausanne, Switzerland), 19 pp. 765–768, 1996.Google Scholar
  6. [6]
    K. Hirata and T. Kato, “Rough Sketch-Based Image Information Retrieval,” NEC Research f4 Development, vol. 34, no. 2, pp. 263–273, 1993.Google Scholar
  7. [7]
    J. Gary and R. Mehrotra, “Shape Similarity-Based Retrieval in Image Database Systems,” SPIE Image Storage and Retrieval Systems, vol. 1662, pp. 2–8, 1992.Google Scholar
  8. [8]
    H. C. Lin, L. L. Wang, and S. N. Yang, “Color Image Retrieval Based on Hidden Markov Models,” in Proc. 1995 IEEE Int. Conf. on Image Proc., (Washington, DC), 19pp. 342–345, 1995.Google Scholar
  9. [9]
    D. A. Knuth, The Art of Computer Science: Sorting and Searching, vol. 3. Reading, MA: Addison Wesley, 1973.Google Scholar
  10. [10]
    M. D. Swanson and A. H. Tewfik, “Embedded Object Dictionaries for Image Database Browsing and Searching,” in Proc. 1996 Int. Conf. on Image Proc., vol. III, (Lausanne, Switzerland), pp. 875–878, 1996.Google Scholar
  11. [11]
    M. Vetterli, Wavelets and Subband Coding. Englewood Cliffs, NJ: P T R Prentice-Hall, Inc., 1995.Google Scholar
  12. [12]
    S.-F. Chang and D. Messerschmitt, “Transform Coding of Arbitrarily-Shaped Image Segments,” Proc. ACM Multimedia, (Anaheim, CA),34 pp. 83–90, 1993.CrossRefGoogle Scholar
  13. [13]
    G. Wallace, “The JPEG Still Picture Compression Standard,” Communications of the ACM, vol. 34, no. 4, pp. 30–44, 1991.CrossRefGoogle Scholar
  14. [14]
    A. Gersho and R. Gray, Vector Quantization and Signal Compression. Boston, MA: Kluwer Academic, 1992.CrossRefGoogle Scholar
  15. [15]
    Z. Huang and F. S. Cohen, “Affine-Invariant B-Spline Moments for Curve Matching,” IEEE Trans. on Image Proc., vol. 5, pp. 1473–1480, Oct. 1996.CrossRefGoogle Scholar
  16. [16]
    R. Rivest, “Cryptography,” in Handbook of Theoretical Computer Science (J. van Leeuwen, ed.), vol. 1, ch. 13, pp. 717–755, Cambridge, MA: MIT Press, 1990.Google Scholar
  17. [17]
    R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A Digital Watermark,” in Proc. 1994 IEEE Int. Conf. on Image Proc., vol. II, (Austin, TX), pp. 86–90, 1994.Google Scholar
  18. [18]
    W. Bender, D. Gruhl, and N. Morimoto, “Techniques for Data Hiding.” Tech. Rep., MIT Media Lab, 1994.Google Scholar
  19. [19]
    J. R. Smith and B. O. Comiskey, “Modulation and Information Hiding in Images,” in Proc. 1996 Workshop on Information Hiding, (Cambridge, UK), 1996.Google Scholar
  20. [20]
    R. Wolfgang and E. Delp, “A Watermark for Digital Images,” in Proc. 1996 Int. Conf. on Image Proc., vol. III, (Lausanne, Switzerland), pp. 219–222, 1996.Google Scholar
  21. [21]
    I. Pitas and T. Kaskalis, “Applying Signatures on Digital Images,” in Proc. 1995 IEEE Nonlinear Signal Processing Workshop, (Thessaloniki, Greece), pp. 460–463, 1995.Google Scholar
  22. [22]
    E. Koch and J. Zhao, “Towards Robust and Hidden Image Copyright Labeling,” in Proc. 1995 IEEE Nonlinear Signal Processing Workshop, (Thessaloniki, Greece), 19pp. 452–455, 1995.Google Scholar
  23. [23]
    I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia.” Tech. Rep. 95–10, NEC Research Institute, 1995.Google Scholar
  24. [24]
    A. Bors and I. Pitas, “Image Watermarking using DCT Domain Constraints,” in Proc. 1996 Int. Conf. on Image Proc., vol. III, (Lausanne, Switzerland), pp. 231–234,1996.Google Scholar
  25. [25]
    F. Boland, J. O. Ruanaidh, and C. Dautzenberg, “Watermarking Digital Images for Copyright Protection,” in Proc. of IEE Intl. Conf. on Image Proc. and Its Applications, (Edinburgh, Scotland), III pp. 321–326, 1995.Google Scholar
  26. [26]
    J. J. K. O Ruanaidh, W. J. Dowling, and F. M. Boland, “Phase Watermarking of Digital Images,” in Proc. 1996 Int. Conf. on Image Proc., vol. III, (Lausanne, Switzerland), pp. 239–242, 1996.Google Scholar
  27. [27]
    E. Adelson, “Digital Signal Encoding and Decoding Apparatus.” U. S. Patent 4,939–515, 1990.Google Scholar
  28. [28]
    F. Hartung and B. Girod, “Digital Watermarking of Raw and Compressed Video,” in Proc. of the SPIE Dig. Comp. Tech. and Systems for Video Comm., vol. 2952, pp. 205–213, Oct. 1996.Google Scholar
  29. [29]
    S. Craver, N. Memon, B.-L. Yeo, and M. Yeung, “Can Invisible Watermarks Resolve Rightful Ownerships?.” IBM Research Technical Report RC 20–509,IBM CyberJournal, July 1996.Google Scholar
  30. [30]
    M. D. Swanson, B. Zhu, and A. Tewfik, “Data Hiding for Video in Video and Other Applications.” Submitted to 5th ACM Mt. Multimedia Conference, Nov., 1997.Google Scholar
  31. [31]
    S. Goldwater and M. Bellare, “Lecture Notes on Cryptography.” Preprint, July 1996.Google Scholar
  32. [32]
    G. E. Legge and J. M. Foley, “Contrast Masking in Human Vision,” J. Opt. Soc. Am., vol. 70, no. 12, pp. 1458–1471, 1980.CrossRefGoogle Scholar
  33. [33]
    B. Zhu, A. Tewfik, and O. Gerek, “Low Bit Rate Near-Transparent Image Coding,” in Proc. of the SPIE Int. Conf. on Wavelet Apps. for Dual Use, vol. 2491, (Orlando, FL), pp. 173–184, 1995.Google Scholar
  34. [34]
    B. Girod, “The Information Theoretical Significance of Spatial and Temporal Masking in Video Signals,” in Proc. of the SPIE Human Vision, Visual Processing, and Digital Display, vol. 1077, pp. 178–187, 1989.Google Scholar
  35. [35]
    J. Johnston and K. Brandenburg, “Wideband coding-perceptual considerations for speech and music,” in Advances in Speech Signal Processing (S. Furui and M. Sondhi, eds.), New York: Dekker, 1992.Google Scholar
  36. [36]
    P. Noll, “Wideband speech and audio coding,” IEEE Communications,81 pp. 34–44, Nov. 1993.CrossRefGoogle Scholar
  37. [37]
    ISO/CEI, “`Codage de l’image animee et du son associe pour les supports de stockage numerique jusqu’a environ 1,5 mbit/s,” Tech. Rep. 11172, ISO/CEI, 1993.Google Scholar
  38. [38]
    N. Jayant, J. Johnston, and R. Safranek, “Signal Compression Based on Models of Human Perception,” Proc. of the IEEE, vol. 81, pp. 1385–1422, Oct. 1993.CrossRefGoogle Scholar
  39. [39]
    D. Taubman and A. Zakhor, “Multirate 3-D Subband Coding of Video,” IEEE Trans. on Image Proc., vol. 3, pp. 572–588, Sept. 1994.CrossRefGoogle Scholar
  40. [40]
    H. L. Van Trees, Detection, Estimation, and Modulation Theory, vol. 1. New York: Wiley, 1968.zbMATHGoogle Scholar
  41. [41]
    M. D. Swanson, B. Zhu, and A. Tewfik, “Robust Image Watermarking Using Perceptual Masking.” Submitted to IEEE Trans. on Image Processing, 1997.Google Scholar
  42. [42]
    M. D. Swanson, B. Zhu, A. Tewfik, and L. Boney, “Robust Audio Watermarking Using Perceptual Masking.” Submitted to Signal Processing, 1997.Google Scholar

Copyright information

© Springer Science+Business Media New York 1999

Authors and Affiliations

  • Mitchell D. Swanson
    • 1
  • Ahmed H. Tewfik
    • 1
  1. 1.Department of Electrical EngineeringUniversity of MinnesotaMinneapolisUSA

Personalised recommendations