Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques
We propose a concept of feasible blind fingerprinting called “semi-blind fingerprinting” which provides as secure content trading as conventional blind fingerprinting methods. In a basic model of conventional fingerprinting for content trading, user’s security could be guaranteed only under the premise that a content provider is trustworthy. Such premise makes a scheme unpractical. To overcome this defect, various blind methods have been proposed in which cryptography is used in order to protect the information on a user. However, computation cost and robustness have not been well considered as a scheme should be feasible, though it provides high-level of protection. A semi-blind scheme fulfills a need for both feasibility and robustness. Under this scheme, feasibility can be achieved by applying newly proposed functions called “Image Division” instead of using cryptography. In order to gain robustness, a protocol for watermarking has been so designed that any well-developed existing watermarking technique can be applied with no restriction. We will not only propose the idea but also implement and evaluate several image division functions as well as an optimized embedding program in order to prove validity of the proposed method.
KeywordsFace Detection Content Provider Trusted Third Party Watermark Technique Embed Image
Unable to display preview. Download preview PDF.
- 1.Stefan Katzenbeisser, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)Google Scholar
- 4.Iwamura, K., Sakurai, K., Imai, H.: Blind fingerprinting. Technical report of IEICE. ISEC 97, 63–74 (1997)Google Scholar
- 5.Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Processing, 2129–2139 (2005)Google Scholar
- 6.Prins, J.P., Erkin, Z., Lagendijk, R.: Anonymous fingerprinting with robust qim watermarking techniques. European Journal of Information Systems 2007, 1–13 (2007)Google Scholar
- 8.Okada, M., Kikuchi, H., Okabe, Y.: Multi-bit embedding in asymmetric digital watermarking without exposing secret information. IEICE E91-D(5), 1348–1358 (2008)Google Scholar
- 9.Furukawa, J.: Secure detection of watermarks. IEICE E87-A(1), 212–220 (2004)Google Scholar
- 10.Inaba, H., Yamamoto, Y.: Proposal on digital contents distribution system for protecting both privacy and copyrights. IEICE J89-D(12), 2536–2542 (2006)Google Scholar
- 11.Okada, M., Okabe, Y., Uehara, T.: A privacy enhanced image sharing system for surveillance cameras based on a fingerprinting technique. CSS 2008 (October 2008)Google Scholar
- 12.Okada, M., Okabe, Y., Uehara, T.: A privacy enhanced image sharing system on the sensing web based on a fingerprinting technique. In: International Workshop on Sensing Web (December 2008)Google Scholar