Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks

Today, more and more data is available in digital form, ranging from normal text to multimedia data such as image or video data. Since some data is of high sensitivity or undergoes legal restrictions, it is important to obtain more reliable information about the data origin and its transformations, known as data provenance. Unfortunately, current approaches for data provenance neither support multimedia data nor provide mechanisms to ensure reliability of the provenance information. In this paper, we present an approach based on existing watermarking schemes evaluated by a database system. Hence, this approach ensures the reliability of multi media data (e.g., fingerprint data) and its corresponding provenance information. Furthermore, we show how this approach can be applied within a specific database, used for fingerprint verification.

[1]  Dinu Coltuc,et al.  Very Fast Watermarking by Reversible Contrast Mapping , 2007, IEEE Signal Processing Letters.

[2]  Raymond A. Paul,et al.  Data provenance in SOA: security, reliability, and integrity , 2007, Service Oriented Computing and Applications.

[3]  J. Dillinger FINGERPRINTS , 1938 .

[4]  James Cheney,et al.  Provenance in Databases: Why, How, and Where , 2009, Found. Trends Databases.

[5]  V. Vianu,et al.  Edinburgh Why and Where: A Characterization of Data Provenance , 2017 .

[6]  Jeffrey D. Ullman,et al.  Principles of Database Systems , 1980 .

[7]  Wang Chiew Tan Provenance in Databases: Past, Current, and Future , 2007, IEEE Data Eng. Bull..

[8]  Ronny Merkel,et al.  Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints - a capacity study for forensic approaches , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).

[9]  Klara Nahrstedt,et al.  Using Cryptographic and Watermarking Algorithms , 2001, IEEE Multim..

[10]  Chandra Shakher,et al.  Fingerprint detection using full-field swept-source optical coherence tomography , 2007 .

[11]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[12]  Arnon Rosenthal,et al.  Enabling Collaborative Administration and Safety Fences: Factored Privileges in SQL Databases , 2004, IEEE Data Eng. Bull..

[13]  Sanjeev Khanna,et al.  Edinburgh Research Explorer On the Propagation of Deletions and Annotations through Views , 2013 .

[14]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.

[15]  Yogesh L. Simmhan,et al.  A survey of data provenance techniques , 2005 .

[16]  Ling Liu,et al.  Encyclopedia of Database Systems , 2009, Encyclopedia of Database Systems.

[17]  Kai-Erik Peiponen,et al.  Application of a diffractive element-based sensor for detection of latent fingerprints from a curved smooth surface , 2009 .

[18]  Edward N Pugh,et al.  Polarization-based and specular-reflection-based noncontact latent fingerprint imaging and lifting. , 2006, Journal of the Optical Society of America. A, Optics, image science, and vision.

[19]  Michael Gertz,et al.  Handbook of Database Security - Applications and Trends , 2007, Handbook of Database Security.

[20]  Klaus R. Dittrich,et al.  Data Provenance: A Categorization of Existing Approaches , 2007, BTW.

[21]  James Cheney,et al.  Provenance management in curated databases , 2006, SIGMOD Conference.

[22]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[23]  Jennifer Widom,et al.  Practical lineage tracing in data warehouses , 2000, Proceedings of 16th International Conference on Data Engineering (Cat. No.00CB37073).

[24]  Nader Engheta,et al.  Polarization- and Specular-Reflection-Based, Non- contact Latent Fingerprint Imaging and Lifting , 2010 .

[25]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[26]  Sushil Jajodia,et al.  Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..

[27]  Yogesh L. Simmhan,et al.  A survey of data provenance in e-science , 2005, SGMD.

[28]  Jennifer Widom,et al.  Tracing the lineage of view data in a warehousing environment , 2000, TODS.

[29]  Radu Sion,et al.  Proving ownership over categorical data , 2004, Proceedings. 20th International Conference on Data Engineering.

[30]  Radu Sion,et al.  Database Watermarking for Copyright Protection , 2008, Handbook of Database Security.

[31]  Wang Chiew Tan,et al.  Research Problems in Data Provenance , 2004, IEEE Data Eng. Bull..

[32]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[33]  Iuon-Chang Lin,et al.  Reversible Watermarking: Current Status and Key Issues , 2006, Int. J. Netw. Secur..

[34]  Richard Hull,et al.  Business Artifacts: A Data-centric Approach to Modeling Business Operations and Processes , 2009, IEEE Data Eng. Bull..

[35]  Vikrambhai S. Sorathia,et al.  Data Provenance , 2009, Encyclopedia of Data Warehousing and Mining.