期刊文献+

Image Betrayal Checking Based on the Digital Fingerprint of Images on the Internet

Image Betrayal Checking Based on the Digital Fingerprint of Images on the Internet
下载PDF
导出
摘要 In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some private files have been leaked. In this paper, we put forward a scheme for active image betrayal checking on the Intemet based on the digital fingerprint, which embeds fingerprints into privacy documents, extracts codes from the Intemet images, and then fmds out the divulged files by matching two groups of codes. Due to so many documents on the Internet, the number of times of code comparison is huge, which leads to a large running time. To overcome the deficiency in practical application, we optimized the process by accurate matching methods and approximate matching method. Then a method was proposed to group objects by locality sensitive hashing (LSH) process before code comparison, in order to eliminate the vast majority of unrelated pairs. Experiments prove that this method could operate with less running time and less memory. In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some private files have been leaked. In this paper, we put forward a scheme for active image betrayal checking on the Intemet based on the digital fingerprint, which embeds fingerprints into privacy documents, extracts codes from the Intemet images, and then fmds out the divulged files by matching two groups of codes. Due to so many documents on the Internet, the number of times of code comparison is huge, which leads to a large running time. To overcome the deficiency in practical application, we optimized the process by accurate matching methods and approximate matching method. Then a method was proposed to group objects by locality sensitive hashing (LSH) process before code comparison, in order to eliminate the vast majority of unrelated pairs. Experiments prove that this method could operate with less running time and less memory.
出处 《Journal of Southwest Jiaotong University(English Edition)》 2010年第2期149-159,共11页 西南交通大学学报(英文版)
基金 National High-Tech Research and Development Program of China(863 Program)(No.2007AA01Z309)
关键词 Betrayal checking Digital watermarking Digital fingerprint Locality sensitive hashing (LSH) Betrayal checking Digital watermarking Digital fingerprint Locality sensitive hashing (LSH)
  • 相关文献

参考文献17

  • 1O Ruanaidh J J K,Pun T.Rotation,Scale and transla-tion invariant digital image watermarking. Proceed-ings of the International conference on Image Processing . 1997
  • 2Yan Y X,Cao W,Li S M.Block-based adaptive image watermarking scheme using just noticeable difference. Proceedings of2009IEEE International Workshop on Im-aging Systems and Techniques (IST09) . 2009
  • 3Yang W M,Jin Z.A watermarking algorithm based on wavelet and cosine transform for color image. Pro-ceedings of2009First International Workshop on Educa-tion Technology and Computer Science . 2009
  • 4Hu A F,Chen N.A blind watermarking algorithm for color image based on wavelet transform and Fourier trans-form. Proceedings of the9th International Conference for Young Computer Scientists (ICYCS2008) . 2008
  • 5Kilian J,Leighton F,Matheson L R,et al.Resistance of digital watermarks to collusive attacks. Tech.Rep.TR-585-98,Dept.Compute.Sci.Princeton Univ . 1998
  • 6Li Z,Trappe W.Collusion-resistant fingerprints from WBE sequence sets. Proc.IEEE ICC2005 . 2005
  • 7Zane F.Efficient watermark detection and collusion security. Proc.Financial Cryptography . 2005
  • 8Gionis A,Indyk P,Motwani R.Similarity search in high dimensions via hashing. Proceedings of Interna-tional Conference on Very Large Data Bases (VLDB) . 1999
  • 9Chor B,Fiat A,Naor M.Tracing Traitors. Advance in Cryptology-CRYPTO’94 . 1994
  • 10Houng Jyh Mike Wang,Po Chyi Su,Jay CC Kuo.Wavelet based Digital Image Watermarking. Optics Express . 1998

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部