Secure Image Archiving Using Novel Digital Watermarking Techniques

Secure Image Archiving Using Novel Digital Watermarking Techniques

Ruo Ando (Keio University, Japan) and Yoshiyasu Takefuji (Keio University, Japan)
DOI: 10.4018/978-1-59904-762-1.ch021
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

With the rapid advance in digital network, digital libraries, and particularly WWW (World Wide Web) services, we can retrieve many kinds of images on personal and mobile computer anytime and anywhere. At the same time, secure image archiving is becoming a major research area because the serious concern is raised about copyright protection and authority identification in digital media. A more sophisticated technique is required for future multimedia copyright protection. In this chapter we propose a secure image archiving using novel digital-watermarking techniques. Firstly, a nonlinear adaptive system (neural network) is applied for frequency-based digital watermarking. Secondly, we discuss application-oriented watermarking method for GIS image archiving. This chapter is divided into two parts. First section is about the way to apply nonlinear adaptive system for frequency-based image watermarking. We propose a new asymmetric technique employing nonlinear adaptive system trained on frequency domain. Our system uses two public keys to prevent removal attack and archive more fragile watermarking. In embedding, location information of frequency domain, where adaptive system is trained, is binalized, expressed in hexadecimal number, and encrypted in asymmetric cryptosystem. Encrypted location information is embedded in several parts of digital host contents. In generating key, supervised neural networks learn to assign the array of coefficients to teacher signal corresponding to the message to insert. This is one kind of transform-based method to generate public key from private key. In extracting, we use key matrix created by one-way signal processing of adaptive system. Proposal method is tested in still image, and we have empirically obtained the results that the proposal model is functional in implementing more secure and fragile watermarking compared with previous techniques, such as correlation and transform-based asymmetric watermarking. Several experiments are reported to validate the effectiveness of our watermarking method. Second section is about the application of GIS image archiving using digital watermarking technique. Recently, the utilization of GIS (geographical information system) is becoming rapidly pervasive. Consequently, new methodology of archiving and managing images is a pressing problem for GIS users. It is also expected that as the utilization of GIS becomes widely spread, protecting copyright and confidential images will be more important. In this chapter, we propose a three-layer image data format that makes it possible to synthesize two kinds of related images and analysis information in one image data size. To achieve the confidentiality of one hidden image, we apply the private watermarking scheme, where the algorithm is closed to the public. In the proposal model, encoder netlist embedded in the third layer is generated by FOL prover to achieve more secure and less information to decode it, compared with one operation of another block cipher such as RSA. Proposal system users can process two images without the cost of maintaining key and decoding operation.

Complete Chapter List

Search this Book:
Reset