Desynchronized image fingerprint for large scale distribution

Collusion is a major menace to image fingerprint. Recently, an idea is introduced for collusion-resilient fingerprint by space desynchronizing including RST (rotation, scaling and translation) and random bending. In this paper, we proposed a new space desynchronized fingerprint method which is for l...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Zhongxuan Liu, Shiguo Lian, Yuan Dong, Haila Wang
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 412
container_issue
container_start_page 409
container_title
container_volume
creator Zhongxuan Liu
Shiguo Lian
Yuan Dong
Haila Wang
description Collusion is a major menace to image fingerprint. Recently, an idea is introduced for collusion-resilient fingerprint by space desynchronizing including RST (rotation, scaling and translation) and random bending. In this paper, we proposed a new space desynchronized fingerprint method which is for large scale distribution: image is enlarged and encrypted at sender side; at user side, key sequence is used to only decrypt some parts of image and compose these parts to make a new image copy with fingerprint embedded. This method has two priorities: first, only one image is needed to send to or be downloaded by all users with fingerprint embedded; secondly, the embedded fingerprint is robust to collusion attack. For diminishing the degradation introduced by desynchronization, we consider the image content such as human face. Experiments indicate the effectiveness of our method.
doi_str_mv 10.1109/ICIP.2008.4711778
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4711778</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4711778</ieee_id><sourcerecordid>4711778</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-58bfe8be01ecc44c27548f579913f84ba49b6057eb97cb376d4c63b2895320ed3</originalsourceid><addsrcrecordid>eNpVkM1KxDAUheMfWMd5AHHTF2jNTW6aZOFC6l9hQBe6Hpr0dox0WknqYnx6B5yNqwPng8PHYewKeAnA7U1TN6-l4NyUqAG0NkdsabUBFIigK5THLBPSQGEU2pN_TPFTloESokBj-Dm7SOmTc8FBQsZu7yntRv8RpzH8UJeHbbuhvA_jhuJXDOOc91PMhzbu2-TbgfIupDkG9z2HabxkZ307JFoecsHeHx_e6udi9fLU1HerIoBWc6GM68k44kDeI3qhFZpeaWtB9gZdi9ZVXGlyVnsnddWhr6QTxiopOHVywa7_dgMRrfde2zbu1ocn5C9za02Z</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Desynchronized image fingerprint for large scale distribution</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Zhongxuan Liu ; Shiguo Lian ; Yuan Dong ; Haila Wang</creator><creatorcontrib>Zhongxuan Liu ; Shiguo Lian ; Yuan Dong ; Haila Wang</creatorcontrib><description>Collusion is a major menace to image fingerprint. Recently, an idea is introduced for collusion-resilient fingerprint by space desynchronizing including RST (rotation, scaling and translation) and random bending. In this paper, we proposed a new space desynchronized fingerprint method which is for large scale distribution: image is enlarged and encrypted at sender side; at user side, key sequence is used to only decrypt some parts of image and compose these parts to make a new image copy with fingerprint embedded. This method has two priorities: first, only one image is needed to send to or be downloaded by all users with fingerprint embedded; secondly, the embedded fingerprint is robust to collusion attack. For diminishing the degradation introduced by desynchronization, we consider the image content such as human face. Experiments indicate the effectiveness of our method.</description><identifier>ISSN: 1522-4880</identifier><identifier>ISBN: 9781424417650</identifier><identifier>ISBN: 1424417651</identifier><identifier>EISSN: 2381-8549</identifier><identifier>EISBN: 9781424417643</identifier><identifier>EISBN: 1424417643</identifier><identifier>DOI: 10.1109/ICIP.2008.4711778</identifier><language>eng</language><publisher>IEEE</publisher><subject>collusion ; Copy right protection ; Cryptography ; Degradation ; desynchronized fingerprint ; Face ; Fingerprint recognition ; Humans ; image fingerprint ; Image segmentation ; Large-scale systems ; Robustness ; Telecommunications ; Watermarking</subject><ispartof>2008 15th IEEE International Conference on Image Processing, 2008, p.409-412</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4711778$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4711778$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zhongxuan Liu</creatorcontrib><creatorcontrib>Shiguo Lian</creatorcontrib><creatorcontrib>Yuan Dong</creatorcontrib><creatorcontrib>Haila Wang</creatorcontrib><title>Desynchronized image fingerprint for large scale distribution</title><title>2008 15th IEEE International Conference on Image Processing</title><addtitle>ICIP</addtitle><description>Collusion is a major menace to image fingerprint. Recently, an idea is introduced for collusion-resilient fingerprint by space desynchronizing including RST (rotation, scaling and translation) and random bending. In this paper, we proposed a new space desynchronized fingerprint method which is for large scale distribution: image is enlarged and encrypted at sender side; at user side, key sequence is used to only decrypt some parts of image and compose these parts to make a new image copy with fingerprint embedded. This method has two priorities: first, only one image is needed to send to or be downloaded by all users with fingerprint embedded; secondly, the embedded fingerprint is robust to collusion attack. For diminishing the degradation introduced by desynchronization, we consider the image content such as human face. Experiments indicate the effectiveness of our method.</description><subject>collusion</subject><subject>Copy right protection</subject><subject>Cryptography</subject><subject>Degradation</subject><subject>desynchronized fingerprint</subject><subject>Face</subject><subject>Fingerprint recognition</subject><subject>Humans</subject><subject>image fingerprint</subject><subject>Image segmentation</subject><subject>Large-scale systems</subject><subject>Robustness</subject><subject>Telecommunications</subject><subject>Watermarking</subject><issn>1522-4880</issn><issn>2381-8549</issn><isbn>9781424417650</isbn><isbn>1424417651</isbn><isbn>9781424417643</isbn><isbn>1424417643</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVkM1KxDAUheMfWMd5AHHTF2jNTW6aZOFC6l9hQBe6Hpr0dox0WknqYnx6B5yNqwPng8PHYewKeAnA7U1TN6-l4NyUqAG0NkdsabUBFIigK5THLBPSQGEU2pN_TPFTloESokBj-Dm7SOmTc8FBQsZu7yntRv8RpzH8UJeHbbuhvA_jhuJXDOOc91PMhzbu2-TbgfIupDkG9z2HabxkZ307JFoecsHeHx_e6udi9fLU1HerIoBWc6GM68k44kDeI3qhFZpeaWtB9gZdi9ZVXGlyVnsnddWhr6QTxiopOHVywa7_dgMRrfde2zbu1ocn5C9za02Z</recordid><startdate>200810</startdate><enddate>200810</enddate><creator>Zhongxuan Liu</creator><creator>Shiguo Lian</creator><creator>Yuan Dong</creator><creator>Haila Wang</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200810</creationdate><title>Desynchronized image fingerprint for large scale distribution</title><author>Zhongxuan Liu ; Shiguo Lian ; Yuan Dong ; Haila Wang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-58bfe8be01ecc44c27548f579913f84ba49b6057eb97cb376d4c63b2895320ed3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>collusion</topic><topic>Copy right protection</topic><topic>Cryptography</topic><topic>Degradation</topic><topic>desynchronized fingerprint</topic><topic>Face</topic><topic>Fingerprint recognition</topic><topic>Humans</topic><topic>image fingerprint</topic><topic>Image segmentation</topic><topic>Large-scale systems</topic><topic>Robustness</topic><topic>Telecommunications</topic><topic>Watermarking</topic><toplevel>online_resources</toplevel><creatorcontrib>Zhongxuan Liu</creatorcontrib><creatorcontrib>Shiguo Lian</creatorcontrib><creatorcontrib>Yuan Dong</creatorcontrib><creatorcontrib>Haila Wang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhongxuan Liu</au><au>Shiguo Lian</au><au>Yuan Dong</au><au>Haila Wang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Desynchronized image fingerprint for large scale distribution</atitle><btitle>2008 15th IEEE International Conference on Image Processing</btitle><stitle>ICIP</stitle><date>2008-10</date><risdate>2008</risdate><spage>409</spage><epage>412</epage><pages>409-412</pages><issn>1522-4880</issn><eissn>2381-8549</eissn><isbn>9781424417650</isbn><isbn>1424417651</isbn><eisbn>9781424417643</eisbn><eisbn>1424417643</eisbn><abstract>Collusion is a major menace to image fingerprint. Recently, an idea is introduced for collusion-resilient fingerprint by space desynchronizing including RST (rotation, scaling and translation) and random bending. In this paper, we proposed a new space desynchronized fingerprint method which is for large scale distribution: image is enlarged and encrypted at sender side; at user side, key sequence is used to only decrypt some parts of image and compose these parts to make a new image copy with fingerprint embedded. This method has two priorities: first, only one image is needed to send to or be downloaded by all users with fingerprint embedded; secondly, the embedded fingerprint is robust to collusion attack. For diminishing the degradation introduced by desynchronization, we consider the image content such as human face. Experiments indicate the effectiveness of our method.</abstract><pub>IEEE</pub><doi>10.1109/ICIP.2008.4711778</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1522-4880
ispartof 2008 15th IEEE International Conference on Image Processing, 2008, p.409-412
issn 1522-4880
2381-8549
language eng
recordid cdi_ieee_primary_4711778
source IEEE Electronic Library (IEL) Conference Proceedings
subjects collusion
Copy right protection
Cryptography
Degradation
desynchronized fingerprint
Face
Fingerprint recognition
Humans
image fingerprint
Image segmentation
Large-scale systems
Robustness
Telecommunications
Watermarking
title Desynchronized image fingerprint for large scale distribution
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T20%3A38%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Desynchronized%20image%20fingerprint%20for%20large%20scale%20distribution&rft.btitle=2008%2015th%20IEEE%20International%20Conference%20on%20Image%20Processing&rft.au=Zhongxuan%20Liu&rft.date=2008-10&rft.spage=409&rft.epage=412&rft.pages=409-412&rft.issn=1522-4880&rft.eissn=2381-8549&rft.isbn=9781424417650&rft.isbn_list=1424417651&rft_id=info:doi/10.1109/ICIP.2008.4711778&rft_dat=%3Cieee_6IE%3E4711778%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424417643&rft.eisbn_list=1424417643&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4711778&rfr_iscdi=true