You are not logged in.
Openly accessible

Watermarking protocol for protecting user's right in content based image retrieval

Zhang, Jun and Ye, Lei 2009, Watermarking protocol for protecting user's right in content based image retrieval, in ICME 2009 : Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, IEEE, Piscataway, N. J., pp. 1082-1085, doi: 10.1109/ICME.2009.5202686.

Attached Files
Name Description MIMEType Size Downloads
zhang-watermarkingprotocol-2009.pdf Published version application/pdf 110.94KB 65

Title Watermarking protocol for protecting user's right in content based image retrieval
Author(s) Zhang, JunORCID iD for Zhang, Jun orcid.org/0000-0002-2189-7801
Ye, Lei
Conference name International Conference on Multimedia & Expo (2009 : New York, N. Y.)
Conference location New York, N. Y.
Conference dates 28 June-3 July 2009
Title of proceedings ICME 2009 : Proceedings of the 2009 IEEE International Conference on Multimedia and Expo
Editor(s) [Unknown]
Publication date 2009
Conference series International Conference on Multimedia and Expo
Start page 1082
End page 1085
Total pages 4
Publisher IEEE
Place of publication Piscataway, N. J.
Keyword(s) content-based image retrieval
watermarking protocol
user’s right problem
Summary Content based image retrieval (CBIR) is a technique to search for images relevant to the user’s query from an image collection.In last decade, most attention has been paid to improve the retrieval performance. However, there is no significant effort to investigate the security concerning in CBIR. Under the query by example (QBE) paradigm, the user supplies an image as a query and the system returns a set of retrieved results. If the query image includes user’s private information, an untrusted server provider of CBIR may distribute it illegally, which leads to the user’s right problem. In this paper, we propose an interactive watermarking protocol to address this problem. A watermark is inserted into the query image by the user in encrypted domain without knowing the exact content. The server provider of CBIR will get the watermarked query image and uses it to perform image retrieval. In case where the user finds an unauthorized copy, a watermark in the unauthorized copy will be used as evidence to prove that the user’s legal right is infringed by the server provider.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 9781424442904
ISSN 1945-7871
Language eng
DOI 10.1109/ICME.2009.5202686
Field of Research 080109 Pattern Recognition and Data Mining
080303 Computer System Security
Socio Economic Objective 890301 Electronic Information Storage and Retrieval Services
HERDC Research category E1.1 Full written paper - refereed
Copyright notice ©2009, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30039523

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 3 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 225 Abstract Views, 65 File Downloads  -  Detailed Statistics
Created: Wed, 26 Oct 2011, 12:47:03 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.