Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques

  • Mitsuo Okada
  • Yasuo Okabe
  • Tetsutaro Uehara
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5703)


We propose a concept of feasible blind fingerprinting called “semi-blind fingerprinting” which provides as secure content trading as conventional blind fingerprinting methods. In a basic model of conventional fingerprinting for content trading, user’s security could be guaranteed only under the premise that a content provider is trustworthy. Such premise makes a scheme unpractical. To overcome this defect, various blind methods have been proposed in which cryptography is used in order to protect the information on a user. However, computation cost and robustness have not been well considered as a scheme should be feasible, though it provides high-level of protection. A semi-blind scheme fulfills a need for both feasibility and robustness. Under this scheme, feasibility can be achieved by applying newly proposed functions called “Image Division” instead of using cryptography. In order to gain robustness, a protocol for watermarking has been so designed that any well-developed existing watermarking technique can be applied with no restriction. We will not only propose the idea but also implement and evaluate several image division functions as well as an optimized embedding program in order to prove validity of the proposed method.


Face Detection Content Provider Trusted Third Party Watermark Technique Embed Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Stefan Katzenbeisser, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)Google Scholar
  2. 2.
    Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  3. 3.
    Pfitzmann, B., Waidner, M.: Anonymous fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  4. 4.
    Iwamura, K., Sakurai, K., Imai, H.: Blind fingerprinting. Technical report of IEICE. ISEC 97, 63–74 (1997)Google Scholar
  5. 5.
    Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Processing, 2129–2139 (2005)Google Scholar
  6. 6.
    Prins, J.P., Erkin, Z., Lagendijk, R.: Anonymous fingerprinting with robust qim watermarking techniques. European Journal of Information Systems 2007, 1–13 (2007)Google Scholar
  7. 7.
    Okada, M., Kikuchi, H.: Secure asymmetric watermark detection without secret of modified pixels. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 165–178. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Okada, M., Kikuchi, H., Okabe, Y.: Multi-bit embedding in asymmetric digital watermarking without exposing secret information. IEICE E91-D(5), 1348–1358 (2008)Google Scholar
  9. 9.
    Furukawa, J.: Secure detection of watermarks. IEICE E87-A(1), 212–220 (2004)Google Scholar
  10. 10.
    Inaba, H., Yamamoto, Y.: Proposal on digital contents distribution system for protecting both privacy and copyrights. IEICE J89-D(12), 2536–2542 (2006)Google Scholar
  11. 11.
    Okada, M., Okabe, Y., Uehara, T.: A privacy enhanced image sharing system for surveillance cameras based on a fingerprinting technique. CSS 2008 (October 2008)Google Scholar
  12. 12.
    Okada, M., Okabe, Y., Uehara, T.: A privacy enhanced image sharing system on the sensing web based on a fingerprinting technique. In: International Workshop on Sensing Web (December 2008)Google Scholar
  13. 13.
    Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Processing 17(5), 58–64 (2000)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Mitsuo Okada
    • 1
  • Yasuo Okabe
    • 2
  • Tetsutaro Uehara
    • 2
  1. 1.Graduate School of InformaticsKyoto UniversityJapan
  2. 2.Academic Center for Computing and Media StudiesKyoto UniversityKyotoJapan

Personalised recommendations