Robust and Secure Image Fingerprinting Learned by Neural Network

被引:39
作者
Li, Yuenan [1 ]
Wang, Dongdong [1 ,2 ]
Tang, Linlin [3 ]
机构
[1] Tianjin Univ, Sch Elect & Informat Engn, Tianjin 300072, Peoples R China
[2] JD Digits Corp, Beijing 100176, Peoples R China
[3] Harbin Inst Technol Shenzhen, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
Content fingerprinting; image fingerprinting; content identification; multimedia security; RING PARTITION; VIDEO; SPARSE;
D O I
10.1109/TCSVT.2019.2890966
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Image fingerprinting is a technique that summarizes the perceptual characteristics of a digital image into an invariant digest, and it is one of the most effective solutions for digital rights management. Most conventional fingerprinting algorithms were developed by assembling manually designed feature extractor and quantizer, which requires extensive expert knowledge and may not capture the intrinsic or abstract visual characteristics of the digital image. Focusing on content identification related applications, we propose a data-driven image fingerprinting algorithm in this paper, where neural network is trained to automatically discover the optimal mapping from image to fingerprint. To ameliorate the difficulty of training, we start by training the fingerprint-computation network in a layer-wise manner to progressively improve its robustness against content-preserving distortions. Initialized by the states learned by layerwise training, the network is then re-trained as a holistic unit, with the objective of maximizing its content identification accuracy. Moreover, we also develop a key-dependent version of the neural network-based fingerprinting algorithm. By quantifying its security using information-theoretic metrics, we have proved that the hierarchical architecture of neural network is beneficial to the security of fingerprinting algorithm. The experimental results on a large testing database show that the proposed work exhibits much higher content identification accuracy than state-of-the-art algorithms, and its execution speed is in the millisecond time scale.
引用
收藏
页码:362 / 375
页数:14
相关论文
共 64 条
[1]  
[Anonymous], 2008, P 8 ACM WORKSHOP DIG
[2]  
[Anonymous], 2001, ACM WORKSH DIG RIGHT
[3]   Robust video hashing based on radial projections of key frames [J].
De Roover, C ;
De Vleeschouwer, C ;
Lefèbvre, F ;
Macq, B .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) :4020-4037
[4]  
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
[5]  
Erhan D, 2010, J MACH LEARN RES, V11, P625
[6]   A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting [J].
Esmaeili, Mani Malek ;
Fatourechi, Mehrdad ;
Ward, Rabab Kreidieh .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) :213-226
[7]   Active Content Fingerpriting [J].
Farhadzadeh, Farzad ;
Voloshynovskiy, Sviatoslav .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (06) :905-920
[8]   Color-based descriptors for image fingerprinting [J].
Gavrielides, Marios A. ;
Sikudova, Elena ;
Pitas, Ioannis .
IEEE TRANSACTIONS ON MULTIMEDIA, 2006, 8 (04) :740-748
[9]   MULTILAYER FEEDFORWARD NETWORKS ARE UNIVERSAL APPROXIMATORS [J].
HORNIK, K ;
STINCHCOMBE, M ;
WHITE, H .
NEURAL NETWORKS, 1989, 2 (05) :359-366
[10]   Quantum Hashing for Multimedia [J].
Jin, Minho ;
Yoo, Chang D. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (04) :982-994