Performing information retrieval tasks while preserving data confidentiality is a desirable capability when a
database is stored on a server maintained by a third-party service provider. This paper addresses the problem
of enabling content-based retrieval over encrypted multimedia databases. Search indexes, along with multimedia
documents, are first encrypted by the content owner and then stored onto the server. Through jointly applying
cryptographic techniques, such as order preserving encryption and randomized hash functions, with image
processing and information retrieval techniques, secure indexing schemes are designed to provide both privacy
protection and rank-ordered search capability. Retrieval results on an encrypted color image database and security
analysis of the secure indexing schemes under different attack models show that data confidentiality can
be preserved while retaining very good retrieval performance. This work has promising applications in secure
multimedia management.
A large portion of digital image data available today is acquired using digital cameras or scanners. While cameras
allow digital reproduction of natural scenes, scanners are often used to capture hardcopy art in more controlled
scenarios. This paper proposes a new technique for non-intrusive scanner model identification, which can be
further extended to perform tampering detection on scanned images. Using only scanned image samples that
contain arbitrary content, we construct a robust scanner identifier to determine the brand/model of the scanner
used to capture each scanned image. The proposed scanner identifier is based on statistical features of scanning
noise. We first analyze scanning noise from several angles, including through image de-noising, wavelet analysis,
and neighborhood prediction, and then obtain statistical features from each characterization. Experimental
results demonstrate that the proposed method can effectively identify the correct scanner brands/models with
high accuracy.
With growing popularity of digital imaging devices and low-cost image editing software, the integrity of image
content can no longer be taken for granted. This paper introduces a methodology for forensic analysis of
digital camera images, based on the observation that many in-camera and post-camera processing operations
leave distinct traces on digital images. We present methods to identify these intrinsic fingerprint traces of
the various processing operations and employ them to verify the authenticity of digital data. We develop
an explicit imaging model to characterize the properties that should be satisfied by a direct camera output,
and model any further processing applied to the camera captured image by a manipulation filter. Utilizing
the manipulation filter coefficients and reference patterns estimated from direct camera outputs using blind
deconvolution techniques, the proposed methods are capable of detecting manipulations made by previously
unseen operations and steganographic embedding.
Digital fingerprinting is an emerging technology to protect multimedia from unauthorized use by embedding a unique fingerprint signal into each user's copy. A robust embedding algorithm is an important building block in order to make the fingerprint resilient to various distortions and collusion attacks. Spread spectrum embedding has been widely used for multimedia fingerprinting. In this paper, we explore another class of embedding methods - Quantization Index Modulation (QIM) for fingerprinting applications. We first employ Dither Modulation (DM) technique and extend it for embedding multiple symbols through a basic dither sequence design. We then develop a theoretical model and propose a new algorithm to improve the collusion resistance of the basic scheme. Simulation results show that the improvement algorithm enhances the collusion resistance, while there is still a performance gap with the existing spread spectrum based fingerprinting. We then explore coded fingerprinting based on spread transform dither modulation (STDM) embedding. Simulation results show that this coded STDM based fingerprinting has significant advantages over spread spectrum based fingerprinting under blind detection.
Conference Committee Involvement (2)
Media Watermarking, Security, and Forensics 2015
9 February 2015 | San Francisco, California, United States
Media Watermarking, Security, and Forensics 2014
3 February 2014 | San Francisco, California, United States
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.