Desynchronized image fingerprint for large scale distribution
Collusion is a major menace to image fingerprint. Recently, an idea is introduced for collusion-resilient fingerprint by space desynchronizing including RST (rotation, scaling and translation) and random bending. In this paper, we proposed a new space desynchronized fingerprint method which is for l...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 412 |
---|---|
container_issue | |
container_start_page | 409 |
container_title | |
container_volume | |
creator | Zhongxuan Liu Shiguo Lian Yuan Dong Haila Wang |
description | Collusion is a major menace to image fingerprint. Recently, an idea is introduced for collusion-resilient fingerprint by space desynchronizing including RST (rotation, scaling and translation) and random bending. In this paper, we proposed a new space desynchronized fingerprint method which is for large scale distribution: image is enlarged and encrypted at sender side; at user side, key sequence is used to only decrypt some parts of image and compose these parts to make a new image copy with fingerprint embedded. This method has two priorities: first, only one image is needed to send to or be downloaded by all users with fingerprint embedded; secondly, the embedded fingerprint is robust to collusion attack. For diminishing the degradation introduced by desynchronization, we consider the image content such as human face. Experiments indicate the effectiveness of our method. |
doi_str_mv | 10.1109/ICIP.2008.4711778 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4711778</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4711778</ieee_id><sourcerecordid>4711778</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-58bfe8be01ecc44c27548f579913f84ba49b6057eb97cb376d4c63b2895320ed3</originalsourceid><addsrcrecordid>eNpVkM1KxDAUheMfWMd5AHHTF2jNTW6aZOFC6l9hQBe6Hpr0dox0WknqYnx6B5yNqwPng8PHYewKeAnA7U1TN6-l4NyUqAG0NkdsabUBFIigK5THLBPSQGEU2pN_TPFTloESokBj-Dm7SOmTc8FBQsZu7yntRv8RpzH8UJeHbbuhvA_jhuJXDOOc91PMhzbu2-TbgfIupDkG9z2HabxkZ307JFoecsHeHx_e6udi9fLU1HerIoBWc6GM68k44kDeI3qhFZpeaWtB9gZdi9ZVXGlyVnsnddWhr6QTxiopOHVywa7_dgMRrfde2zbu1ocn5C9za02Z</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Desynchronized image fingerprint for large scale distribution</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Zhongxuan Liu ; Shiguo Lian ; Yuan Dong ; Haila Wang</creator><creatorcontrib>Zhongxuan Liu ; Shiguo Lian ; Yuan Dong ; Haila Wang</creatorcontrib><description>Collusion is a major menace to image fingerprint. Recently, an idea is introduced for collusion-resilient fingerprint by space desynchronizing including RST (rotation, scaling and translation) and random bending. In this paper, we proposed a new space desynchronized fingerprint method which is for large scale distribution: image is enlarged and encrypted at sender side; at user side, key sequence is used to only decrypt some parts of image and compose these parts to make a new image copy with fingerprint embedded. This method has two priorities: first, only one image is needed to send to or be downloaded by all users with fingerprint embedded; secondly, the embedded fingerprint is robust to collusion attack. For diminishing the degradation introduced by desynchronization, we consider the image content such as human face. Experiments indicate the effectiveness of our method.</description><identifier>ISSN: 1522-4880</identifier><identifier>ISBN: 9781424417650</identifier><identifier>ISBN: 1424417651</identifier><identifier>EISSN: 2381-8549</identifier><identifier>EISBN: 9781424417643</identifier><identifier>EISBN: 1424417643</identifier><identifier>DOI: 10.1109/ICIP.2008.4711778</identifier><language>eng</language><publisher>IEEE</publisher><subject>collusion ; Copy right protection ; Cryptography ; Degradation ; desynchronized fingerprint ; Face ; Fingerprint recognition ; Humans ; image fingerprint ; Image segmentation ; Large-scale systems ; Robustness ; Telecommunications ; Watermarking</subject><ispartof>2008 15th IEEE International Conference on Image Processing, 2008, p.409-412</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4711778$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4711778$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zhongxuan Liu</creatorcontrib><creatorcontrib>Shiguo Lian</creatorcontrib><creatorcontrib>Yuan Dong</creatorcontrib><creatorcontrib>Haila Wang</creatorcontrib><title>Desynchronized image fingerprint for large scale distribution</title><title>2008 15th IEEE International Conference on Image Processing</title><addtitle>ICIP</addtitle><description>Collusion is a major menace to image fingerprint. Recently, an idea is introduced for collusion-resilient fingerprint by space desynchronizing including RST (rotation, scaling and translation) and random bending. In this paper, we proposed a new space desynchronized fingerprint method which is for large scale distribution: image is enlarged and encrypted at sender side; at user side, key sequence is used to only decrypt some parts of image and compose these parts to make a new image copy with fingerprint embedded. This method has two priorities: first, only one image is needed to send to or be downloaded by all users with fingerprint embedded; secondly, the embedded fingerprint is robust to collusion attack. For diminishing the degradation introduced by desynchronization, we consider the image content such as human face. Experiments indicate the effectiveness of our method.</description><subject>collusion</subject><subject>Copy right protection</subject><subject>Cryptography</subject><subject>Degradation</subject><subject>desynchronized fingerprint</subject><subject>Face</subject><subject>Fingerprint recognition</subject><subject>Humans</subject><subject>image fingerprint</subject><subject>Image segmentation</subject><subject>Large-scale systems</subject><subject>Robustness</subject><subject>Telecommunications</subject><subject>Watermarking</subject><issn>1522-4880</issn><issn>2381-8549</issn><isbn>9781424417650</isbn><isbn>1424417651</isbn><isbn>9781424417643</isbn><isbn>1424417643</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVkM1KxDAUheMfWMd5AHHTF2jNTW6aZOFC6l9hQBe6Hpr0dox0WknqYnx6B5yNqwPng8PHYewKeAnA7U1TN6-l4NyUqAG0NkdsabUBFIigK5THLBPSQGEU2pN_TPFTloESokBj-Dm7SOmTc8FBQsZu7yntRv8RpzH8UJeHbbuhvA_jhuJXDOOc91PMhzbu2-TbgfIupDkG9z2HabxkZ307JFoecsHeHx_e6udi9fLU1HerIoBWc6GM68k44kDeI3qhFZpeaWtB9gZdi9ZVXGlyVnsnddWhr6QTxiopOHVywa7_dgMRrfde2zbu1ocn5C9za02Z</recordid><startdate>200810</startdate><enddate>200810</enddate><creator>Zhongxuan Liu</creator><creator>Shiguo Lian</creator><creator>Yuan Dong</creator><creator>Haila Wang</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200810</creationdate><title>Desynchronized image fingerprint for large scale distribution</title><author>Zhongxuan Liu ; Shiguo Lian ; Yuan Dong ; Haila Wang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-58bfe8be01ecc44c27548f579913f84ba49b6057eb97cb376d4c63b2895320ed3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>collusion</topic><topic>Copy right protection</topic><topic>Cryptography</topic><topic>Degradation</topic><topic>desynchronized fingerprint</topic><topic>Face</topic><topic>Fingerprint recognition</topic><topic>Humans</topic><topic>image fingerprint</topic><topic>Image segmentation</topic><topic>Large-scale systems</topic><topic>Robustness</topic><topic>Telecommunications</topic><topic>Watermarking</topic><toplevel>online_resources</toplevel><creatorcontrib>Zhongxuan Liu</creatorcontrib><creatorcontrib>Shiguo Lian</creatorcontrib><creatorcontrib>Yuan Dong</creatorcontrib><creatorcontrib>Haila Wang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhongxuan Liu</au><au>Shiguo Lian</au><au>Yuan Dong</au><au>Haila Wang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Desynchronized image fingerprint for large scale distribution</atitle><btitle>2008 15th IEEE International Conference on Image Processing</btitle><stitle>ICIP</stitle><date>2008-10</date><risdate>2008</risdate><spage>409</spage><epage>412</epage><pages>409-412</pages><issn>1522-4880</issn><eissn>2381-8549</eissn><isbn>9781424417650</isbn><isbn>1424417651</isbn><eisbn>9781424417643</eisbn><eisbn>1424417643</eisbn><abstract>Collusion is a major menace to image fingerprint. Recently, an idea is introduced for collusion-resilient fingerprint by space desynchronizing including RST (rotation, scaling and translation) and random bending. In this paper, we proposed a new space desynchronized fingerprint method which is for large scale distribution: image is enlarged and encrypted at sender side; at user side, key sequence is used to only decrypt some parts of image and compose these parts to make a new image copy with fingerprint embedded. This method has two priorities: first, only one image is needed to send to or be downloaded by all users with fingerprint embedded; secondly, the embedded fingerprint is robust to collusion attack. For diminishing the degradation introduced by desynchronization, we consider the image content such as human face. Experiments indicate the effectiveness of our method.</abstract><pub>IEEE</pub><doi>10.1109/ICIP.2008.4711778</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1522-4880 |
ispartof | 2008 15th IEEE International Conference on Image Processing, 2008, p.409-412 |
issn | 1522-4880 2381-8549 |
language | eng |
recordid | cdi_ieee_primary_4711778 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | collusion Copy right protection Cryptography Degradation desynchronized fingerprint Face Fingerprint recognition Humans image fingerprint Image segmentation Large-scale systems Robustness Telecommunications Watermarking |
title | Desynchronized image fingerprint for large scale distribution |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T20%3A38%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Desynchronized%20image%20fingerprint%20for%20large%20scale%20distribution&rft.btitle=2008%2015th%20IEEE%20International%20Conference%20on%20Image%20Processing&rft.au=Zhongxuan%20Liu&rft.date=2008-10&rft.spage=409&rft.epage=412&rft.pages=409-412&rft.issn=1522-4880&rft.eissn=2381-8549&rft.isbn=9781424417650&rft.isbn_list=1424417651&rft_id=info:doi/10.1109/ICIP.2008.4711778&rft_dat=%3Cieee_6IE%3E4711778%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424417643&rft.eisbn_list=1424417643&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4711778&rfr_iscdi=true |