A NOVEL IMAGE THEFT IDENTIFICATION USING BIOMETRIC FEATURE


Jincy J Fernandez, Nithyanandam Pandian, Raghuvamsh Chavali, Ashwanth Kumar Appalaghe

Abstract


In today’s internet world, all the data are represented and stored in digital form. Almost any entity in this world can be represented digitally, ranging from simple text to complex multimedia work. Now, the challenge is to claim the ownership and prevent theft of one’s own digital data. Multimedia theft has driven the attention of many stakeholders who spend huge money and precious time in creating or making such valuable digital data. Among all the multimedia entities, image files are more vulnerable for theft since it is the basic component of any visuals. The notion of this research work is to propose an image theft detection model which will determine whether partial theft or complete theft of an image has occurred or not. A biometric feature, i.e., fingerprint of the owner is embedded on the digital image at a micro level, such that even a very small portion of image theft can be determined, and the ownership of the image can be claimed by the owner. This research is limited to the spatial domain, i.e. raw image. Assessment metrics of the results shows that embedding the biometric feature on an image does not distort the image quality and its artifacts.


Keywords


Digital watermarking, Content authentication, Ownership, Copyright protection, Fingerprint recognition.

| PDF |

References


Al-Nu’aimi A. Using watermarking techniques to prove rightful ownership of web images. 2013; p. 130-2. DOI: 10.4018/978-1-4666- 2157-2.ch008.

Sencar HT, Memon N. Watermarking and Ownership Problem: A Revisit. 5th ACM Workshop on Digital Rights Management; 2005. p. 93-101.

Mali K, Bhattacharya S. Comparative study of different biometric features. Int J Adv Res Comput Commun Eng 2013;2(7):2776-84.

Davies J, Hare J, Samangooei S, Preston J, Jain N, Dupplaw D. Identifying Geographic Location of an Image with a Multimodal Probability Density Function. MediaEval Workshop; 2013.

Hsieh SL, Huang HC, Tsai IJ. A copyright protection scheme for gray level images using human fingerprint images as watermarks. In: Proceedings of the International Conference on Information Technology, New Generations; 2006.

Wang Y, Doherty JF, van Dyck RE. A watermarking algorithm for fingerprinting intelligence images. In: Proceedings of the Conference on Information Sciences and Systems; 2001.

Alomari R, Al-Jaber A. A fragile watermarking algorithm for content authentication. Int J Comput Inf Sci 2004;2(1):27-37.

Gunsel B, Uludag U, Tekalp AM. Robust watermarking of fingerprint images. Pattern Recognit 2002;35(12):2739-47.

Jain S. Digital Watermarking Techniques: A Case Study in Fingerprints and Faces, ICVGIP; 2000. p. 139-44.

Wu M, Liu B. Watermarking for image authentication. In: Proceedings IEEE International Conference on Image Processing. Vol. 2; 1998. p. 437-41.

Friedman GL. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Trans Consum Electron 1993;39(4):905-10.

Saxena R, Shah K, Chawla R, Santhi V. Biometric watermarking for copyright protection of digital images. Int J Appl Eng Res 2014;9(24):23681-8.

Rao NN, Thrimurthy P, Babu R. An efficient copyright protection scheme for digital images using biometrics and watermarking. International Conference on Computer Science and Information Technology; 2009.

Tu SF, Hsu CS. A joint ownership protection scheme for digital images based on visual cryptography. Int Arab J Inf Technol 2012;9(3):276-83.

Shinde P, Mohol C. Copyright protection for images on android phones. Int J Res Eng Technol 2013;2(11):96-8.

Beaullieu S, Crissey J, Smith I. BPCS Steganography. San Antonio: University of Texas at San Antonio. 2003.

Adelsbach A, Pfitzmann B, Sadeghi A. Proving Ownership of Digital Content. Vol. 1768. IHW; 2000. p. 126-41.

Wang S, Lin Y. Wavelet tree quantization for copyright protection watermarking. IEEE Trans Image Process 2004;13(2):154-65.

Ahmad S, Lu ZM. A joint biometrics and watermarking based framework for fingerprinting, copyright protection, proof of ownership, and security applications. International Conference on Computational Intelligence and Security Workshops; 2007.

Wang HJ, Kuo CJ. Image Protection via Watermarking on Perceptually Significant Wavelet Coefficients. IEEE Workshop on Multimedia Signal Processing; 1998.

Lu CS, Liao HY. Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 2001;10(10):1579-92.

Huffman D. A method for the construction of minimum redundancy codes. Proc Inst Radio Eng 1952;40(9):1098-101.

Nag A, Biswas S, Sarkar D, Sarkar PP. A novel technique for image steganography based on block-DCT and huffman encoding. Int J Comput Sci Inf Technol 2010;2(3):103-12.

Nag A, Biswas S, Sarkar D, Sarkar PP. A novel technique for image steganography based on DWT and huffman encoding. Int J Comput Sci Secur 2011;4(6):561-70.

Kang S, Aoki Y. Image data embedding system for watermarking using fresnel transform. IEEE Int Conf Multimed Comput Syst 1999;1:885-9.

Ghoshal N, Mandal JK. A novel technique for image authentication in frequency domain using discrete fourier transformation technique. Malays J Comput Sci 2008;21(1):24-32.

Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T. Digital Watermarking and Steganography. 2nd ed. Burlington: Morgan Kaufmann; 2008.

Sarkar A, Madhow U, Manjunath BS. Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography. IEEE Trans Inf Forensic Secur 2010;5(2):225-39.

Nithyanandam P, Ravichandran T, Priyadharshini E, Santron NM. A spatial domain image steganography technique based on matrix embedding and huffman encoding. Int J Comput Sci Secur IJCSS 2011;5(5):456-68.

Nithyanandam P, Ravichandran T, Priyadharshini E, Santron NM. An image steganography for color images using lossless compression technique. Int J Comput Sci Eng 2012;7(3):194-205.

Nithyanandam P, Ravichandran T, Priyadharshini E, Santron NM. An image steganography technique on spatial domain using matrix and LSB embedding based on huffman encoding. Imanagers J Future Eng Technol 2011;6(3):2011.

Nithyanandam P, Ravichandran T. A hybrid embedded steganography technique: Optimum pixel method and matrix embedding. In: Proceeding of International Conference on Advances in Computing, Communications and Informatics; 2012. p. 1123-30.

Rivest R. The MD5 Message Digest Algorithm, RFC 1321. Internet Engineering Task Force (IETF) published RFC1321: MIT Laboratory of Computer Science & RSA Data Security, Inc.; 1992.

Sheikh HR, Wang Z, Cormack L, Bovik AC. LIVE Image Quality Assessment Database Release 2. Available from: http://www.live.ece. utexas.edu/research/quality. [Last accessed on 2017 Feb 02].

CASIA-Fingerprint Image Database for Testing Version 1.0. Available from: http://www.biometrics.idealtest.org. [Last accessed on 2017 Feb 02].

Wang Z, Bovik AC. Mean squared error: Love it or leave it? A new look at signal fidelity measures. IEEE Signal Process Mag 2009;6(1):98-117.

Hmood KA, Kasirun ZM, Jalab AH, Alam GM, Zaidan AA, Zaidan BB. On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int J Phys Sci 2010;5(7):1054-62.

Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 2004;13(4):600-12.

Gonzalez RC, Woods RE. Digital Image Processing. 2nd ed. Upper Saddle River, NJ: Pearson Prentice Hall; 2002.

Sahu D, Parsai MP. Different image fusion techniques: A critical review. Int J Mod Eng Res 2012;2(5):4298-301.

Chavali R, Appalaghe AK. A System and method to identify a user using an imaging system. 5831/CHE/2014, 09/01/2015.




About this article

Title

A NOVEL IMAGE THEFT IDENTIFICATION USING BIOMETRIC FEATURE

Keywords

Digital watermarking, Content authentication, Ownership, Copyright protection, Fingerprint recognition.

DOI

10.22159/ajpcr.2017.v10s1.19762

Date

01-04-2017

Additional Links

Manuscript Submission

Journal

Asian Journal of Pharmaceutical and Clinical Research
Special Issue April 2017 Page: 385-389

Print ISSN

0974-2441

Online ISSN

2455-3891

Statistics

158 Views | 145 Downloads

Authors & Affiliations

Jincy J Fernandez
School of Computing Science and Engineering, VIT University, Chennai, Tamil Nadu, India
India

Nithyanandam Pandian
School of Computing Science and Engineering, VIT University, Chennai, Tamil Nadu, India
India

Raghuvamsh Chavali
Founder, Rashonic Unicpixel Technology Pvt. Ltd, Hyderabad, Telengana, India,
India

Ashwanth Kumar Appalaghe
Co-founder, Rashonic Unicpixel Technology Pvt. Ltd, Hyderabad, Telengana, India
India


Article Tools


Email this article (Login required)
Email the author (Login required)

Refbacks

  • There are currently no refbacks.