All Title Author
Keywords Abstract

Robust Signature-Based Copyright Protection Scheme Using the Most Significant Gray-Scale Bits of the Image

DOI: 10.1155/2012/875759

Full-Text   Cite this paper   Add to My Lib


The most significant bit- (MSB-) plane of an image is least likely to change by the most signal processing operations. This paper presents a novel multibit logo-based signature, using the most significant gray-scale bits, which is then used to develop an extremely simple but robust copyright protection scheme, where images along with their signatures are sent to a trusted third party when a dispute arises. Different ways of processing the MSB-plane before calculating the robust signature have been developed. This paper then presents an innovative classifier-based technique to test the robustness and uniqueness of any signature-based scheme. A new MSB-based attack, which would defeat our scheme most, has also been proposed. Experimental results have clearly demonstrated the superiority of the proposed scheme showing the high robustness of different MSB-based signatures over the existing signature-based schemes. 1. Introduction For last few years, we have been using electronic commerce that includes online and offline distribution of multimedia data like images, audios, and videos. However, digital multimedia files can be easily manipulated using commercial graphics tools. Duplicating digital files has become as simple as clicking a button. Since maintaining an exact or manipulated duplicate of any digital data is easier than before, the enforcement of copyright protection has become more imperative than ever. Although copyright laws are being applied against abusers in order to ensure secure electronic commerce, the current problems with copyright protection obstruct the rapid evolution of computer and communication networks. As a result, the enhancement and further development of digital copyright protection is in central to the development of future communication networks [1]. There may be three types of solutions to the copyright protection problem: cryptographic tools, digital watermarking techniques, and digital signature-based techniques. Cryptographic tools [2] can be used to encrypt a multimedia file using some secret key. The encrypted file is no more perceptually understandable and can be distributed to the users. Only the appropriate user that holds the secret key can decrypt and use this file. Such a technique while suitable for text documents is not suitable for multimedia data for the following two reasons. First, multimedia file size is much larger than that of text. Therefore, encrypting or decrypting a multimedia file is highly time consuming. Second, the encrypted media file is not useful in the public domain, for example, in the


[1]  T. H. Chen, G. Horng, and W. B. Lee, “A publicly verifiable copyright-proving scheme resistant to malicious attacks,” IEEE Transactions on Industrial Electronics, vol. 52, no. 1, pp. 327–334, 2005.
[2]  W. Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, Englewood Cliffs, NJ, USA, 2nd edition, 1999.
[3]  I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997.
[4]  M. Kutter, F. Jordan, and F. Bossen, “Digital watermarking of color images using amplitude modulation,” Journal of Electronic Imaging, vol. 7, no. 2, pp. 326–332, 1998.
[5]  R. K. Sharma and S. Decker, “Practical challenges for digital watermarking applications,” in Proceedings of the IEEE 4th Workshop on Multimedia Signal Processing, pp. 237–242, October 2001.
[6]  I. J. Cox, M. L. Miller, and A. L. Mckellips, “Watermarking as communications with side information,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1127–1141, 1999.
[7]  M. Awrangjeb and M. S. Kankanhalli, “Reversible watermarking using a perceptual model,” Journal of Electronic Imaging, vol. 14, no. 1, Article ID 013014, pp. 1–8, 2005.
[8]  S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, “Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 573–586, 1998.
[9]  K. Ratakonda, R. Dugad, and N. Ahuja, “Digital image watermarking: issues in resolving rightful ownership,” in Proceedings of the International Conference on Image Processing (ICIP '98), vol. 2, pp. 414–418, October 1998.
[10]  C. I. Podilchuk and W. Zeng, “Image-adaptive watermarking using visual models,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 525–539, 1998.
[11]  M. Awrangjeb and G. Lu, “A robust content-based watermarking technique,” in Proceedings of the IEEE 10th Workshop on Multimedia Signal Processing (MMSP '08), pp. 713–718, Cairns, Australia, October 2008.
[12]  C. C. Chang, K. F. Hwang, and M. S. Hwang, “Robust authentication scheme for protecting copyrights of images and graphics,” IEE Proceedings: Vision, Image and Signal Processing, vol. 149, no. 1, pp. 43–50, 2002.
[13]  W. B. Lee and T. H. Chen, “A public verifiable copy protection technique for still images,” Journal of Systems and Software, vol. 62, no. 3, pp. 195–204, 2002.
[14]  C. C. Chang, J. Y. Hsiao, and C. L. Chiang, “An image copyright protection scheme based on torus automorphism,” in Proceedings of the 1st International Symposium on Cyber Worlds, pp. 217–224, November 2002.
[15]  C. C. Chang and J. C. Chuang, “An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,” Pattern Recognition Letters, vol. 23, no. 8, pp. 931–941, 2002.
[16]  H. Quan and S. Guangchuan, “A semi-blind robust watermarking for digital images,” in Proceedings of the IEEE International Conference on Accoustics, Speech, and Signal Processing, vol. 2, pp. 541–544, April 2003.
[17]  C. Y. Lin and S. F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 2, pp. 153–168, 2001.
[18]  C. S. Lu and H. Y. M. Liao, “Structural digital signature for image authentication: an incidental distortion resistant scheme,” IEEE Transactions on Multimedia, vol. 5, no. 2, pp. 161–173, 2003.
[19]  S. Katzenbeisser, “On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking,” in Proceedings of the 12th International Workshop on Database and Expert Systems Applications, pp. 815–819, 2001.
[20]  B. Macq, J. Dittmann, and E. J. Delp, “Benchmarking of image watermarking algorithms for digital rights management,” Proceedings of the IEEE, vol. 92, no. 6, pp. 971–983, 2004.
[21]  M. Awrangjeb and M. Murshed, “Robust signature-based geometric invariant copyright protection,” in Proceedings of the IEEE International Conference on Image Processing (ICIP '06), pp. 1961–1964, Atlanta, Ga, USA, October 2006.
[22]  Free, 2005,
[23]  “Photo database,” 2005,
[24]  F. A. P. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 58–64, 2000.
[25]  M. Awrangjeb, G. Lu, and M. Murshed, “Global geometric distortion correction in images,” in Proceedings of the IEEE 8th Workshop on Multimedia Signal Processing (MMSP '06), pp. 435–440, Victoria, Canada, October 2006.
[26]  M. Awrangjeb and G. Lu, “A robust corner matching technique,” in Proceedings of the IEEE International Conference onMultimedia and Expo (ICME '07), pp. 1483–1486, Beijing, China, July 2007.
[27]  N. Cristianini and J. S. Taylor, An Introduction to Support Vector Machines and other Kernel-Based Learning Methods, Cambridge University Press, New York, NY, USA, 1st edition, 2000.
[28]  G. A. F. Seber, Multivariate Observations, Wiley, New York, NY, USA, 1984.


comments powered by Disqus