A New Copyright- and Privacy-Protected Image Trading System Using a Novel SteganographyBased Visual Encryption Scheme
Main Article Content
Abstract
In copyright- and privacy-protected image trading systems, the image sent to the trusted third party (TTP) is visually encrypted, and the image is traditionally unrecognizable. The image, however, is suspicious and has possibility to be attacked. Image steganography then becomes more interesting than image encryption for this application, however, applying image steganography instead of image encryption degrades the fingerprint extraction performance. In addition, the CP is allowed to directly contact with the consumer in the conventional systems. Thus, the consumer’s privacy is not protected completely. This paper then proposes a new copyright- and privacy-protected image trading system with a novel steganography-based visual encryption scheme, where the scheme protects a commercial image much more securely by generating a recognizable image instead of a suspicious encrypted image. By replacing amplitude components of a dummy image by those of a commercial image, the output image looks like a degraded dummy image instead of the commercial image, while it contains some details of the commercial image, i.e., the amplitude components of the commercial image are hidden into a dummy cover image. A discrete cosine transform-based fingerprinting method, which is compatible with the proposed amplitude component replacing scheme, is also proposed in this paper to solve the problem of applying image steganography. As another contribution of this paper, the CP is not allowed to directly send the image reconstruction key to the consumer, for further consumer’s privacy protection. The second TTP is then introduced to the proposed system, and in addition, the image reconstruction key is encrypted by the CP before being sent to the consumer via the second TTP for more security. Experimental results show that the proposed scheme generates recognizable images and perfectly visually encrypts the commercial images. It also achieves much higher reconstructed image qualities than those of the conventional scheme, and the proposed system simultaneously enhances the fingerprinting performance using the proposed compatible fingerprinting method.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.
- Creative Commons Copyright License
The journal allows readers to download and share all published articles as long as they properly cite such articles; however, they cannot change them or use them commercially. This is classified as CC BY-NC-ND for the creative commons license.
- Retention of Copyright and Publishing Rights
The journal allows the authors of the published articles to hold copyrights and publishing rights without restrictions.
References
[2] M. Kuribayashi, “Recent fingerprinting techniques with cryptographic protocol,” Signal Processing, S. Miron, ed., InTech, 2010.
[3] I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich, and T. Kalker, “Digital watermarking and steganography,” 2nd ed., Morgan Kaufmann Publishers, 2008.
[4] B. Schneier, “Applied cryptography: protocols, algorithms, and source code in C,” 2nd ed., John Wiley & Sons, 1996.
[5] Y. Sengoku and H. Hioki, “A model of privacy and copyright-aware image trading system based on adaptive image segmentation and digital watermarking,” in ITC-CSCC, Sapporo, Japan, pp. D-W1-02, Jul. 15-18, 2012.
[6] Y. Sengoku and H. Hioki, “An image segmentation method for privacy and copyright-aware image trading system,” IEICE Tech. Rep., vol. 111, no. 496, EMM2011-67, pp.19–24, Mar. 2012.
[7] M. Okada, Y. Okabe, and T. Uehara, “A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking,” in Proc. IEEE CCNC, 2010.
[8] S. Liu, M. Fujiyoshi, and H. Kiya, “An image trading system using amplitude-only images for privacy- and copyright-protection,” IEICE Trans. Fundamentals, vol. E96-A, pp. 1245–1252, Jun. 2013.
[9] W. Sae-Tang, M. Fujiyoshi, and H. Kiya, “A Generation Method of Amplitude-Only Images with Low Intensity Ranges,” IEICE Trans. Fundamentals, vol. E96-A, no. 6, pp. 1323–1330, Jun. 2013.
[10] W. Sae-Tang, S. Liu, M. Fujiyoshi, and H. Kiya, “1D Frequency Transformation-Based Amplitude-Only Images for Copyright- and Privacy-Protection in Image Trading Systems,” ECTI-CIT, vol. 8, no. 2, Nov. 2014.
[11] W. Sae-Tang, M. Fujiyoshi, and H. Kiya, “Evaluation of Amplitude-Only Images for Copyright- and Privacy-Protected Image Trading Systems,” in ITC-CSCC, Phuket, Thailand, no. 1069, pp. 113–116, Jul. 1-4, 2014.
[12] W. Sae-Tang and H. Kiya, “Hadamard Transform-Based Amplitude-Only Images for Image Trading Systems,” in IWAIT, Busan, Korea, no. 3C.5, Jan. 6-8, 2016.
[13] W. Sae-Tang, M. Fujiyoshi, and H. Kiya, “Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System,” in ICAIP, Bangkok, Thailand, pp. 66–71, Aug. 25–27, 2017.
[14] K. Stefan and F. Petitcolas, “Information hiding techniques for steganography and digital watermarking,” Artech house, 2000.
[15] J. Neil F. and S. Jajodia, “Exploring steganography: Seeing the unseen,” Computer 31.2, 1998.
[16] B. Shumeet, “Hiding images in plain sight: Deep steganography,” Advances in Neural Information Processing Systems, pp. 2069–2079, 2017.
[17] A.V. Oppenheim and J.S. Lim, “The importance of phase in signals,” IEEE, vol. 69, pp. 529–541, May. 1981.
[18] K. Ito, A. Nikaido, T. Aoki, E. Kosuge, R. Kawamata, and I. Kashima, “A dental radiograph recognition system using phase-only correlation for human identification,” IEICE Trans. Fundamentals, vol. E91-A, no. 1, pp. 298–305, Jan. 2008.
[19] K. Ito, T. Aoki, H. Nakajima, K. Kobayashi, and T. Higuchi, “A palmprint recognition algorithm using phase-only correlation,” IEICE Trans. Fundamentals, vol. E91-A, no. 4, pp. 1023–1030, Apr. 2008.
[20] K. Miyazawa, K. Ito, T. Aoki, K. Kobayashi, and H. Nakajima, “An effective approach for iris recognition using phase-based image matching,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 30, no. 10, pp. 1741–1756, Oct. 2008.
[21] Q.-S. Chen, M. Defrise, and F. Deconinck, “Symmetric phase-only matched filtering of Fourier-Mellin transforms for image registration and recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 16, no. 12, pp. 1156–1168, Dec. 1994.
[22] C.H. Knapp and G.C. Carter, “The generalized correlation method for estimation of time delay,” IEEE Trans. Acoustics, Speech, and Signal Process., vol. ASSP-24, no. 4, pp. 320–327, Aug. 1976.
[23] C.D. Kuglin and D.C. Hines, “The phase correlation image alignment method,” Proc. IEEE Int. Conf. Cybernetics and Society, pp. 163–165, 1975.
[24] K. Takita, T. Aoki, Y. Sasaki, T. Higuchi, and K. Kobayashi, “High accuracy subpixel image registration based on phase-only correlation,” IEICE Trans. Fundamentals, vol. E86-A, no. 8, pp. 1925–1934, Aug. 2003.
[25] H. Amirshahi, S. Kondo, K. Ito, and T. Aoki, “An image completion algorithm using occlusion-free images from Internet photo sharing sites,” IEICE Trans. Fundamentals, vol. E91-A, no. 10, pp. 2918–2927, Oct. 2008.
[26] I. Ito and H. Kiya, “One-time key based phase scrambling for phaseonly correlation between visually protected images,” EURASIP J. Inf. Security, vol. 2009, no. 841045, Jan. 2010.
[27] I. Ito and H. Kiya, “Phase-only correlation based matching in scrambled domain for preventing illegal matching,” LNCS Transactions on Data Hiding and Multimedia Security V, vol. 6010/2010, pp. 51–69, Jun. 2010.
[28] T. Tachibana, M. Fujiyoshi, and H. Kiya, “A watermarking scheme retaining the desired image quality in order to be applicable to watermarks with various distributions,” IEICE Trans. Inf. & Sys. (Japanese Edition), vol. J87-D-II, no. 3, pp. 850–859, Mar. 2004.
[29] H. Inoue, A. Miyazaki, and T. katsura, “An image watermarking method based on the wavelet transform,” in Proc. IEEE ICIP, pp. 296–300, 1999.
[30] Z. Zhang, Q. Sun, and W. Wong, “A novel lossy-to-lossless watermarking scheme for JPEG2000 images,” in Proc. IEEE ICIP, pp. 573–576, 2004.
[31] Y. Chen and H. Huang, “A progressive image watermarking scheme for JPEG2000,” in Proc. IEEE IIH-MSP, pp. 230–233, 2012.
[32] L. Sun, JC. Xu, XX. Zhang, and Y. Tian, “An image watermarking scheme using Arnold transform and fuzzy smooth support vector machine,” Math. Probl. Eng., vol. 2015, Article ID 931672.
[33] FL. Liu and LL. Liu, “A new watermarking approach based on BP network in wavelet domain,” in Proc. IEEE CISP, pp. 1142–1145, Oct. 16-18, 2010.
[34] S.D. Lin, S.C. Shie, and J.Y. Guo, “Improving the robustness of DCT-based image watermarking against JPEG compression,” Comput. Stand. Interfaces, vol. 32, no. 1-2, pp. 54–60, Jan. 2010.