The Service-Oriented Architecture (SOA) demands supportive technologies and new requirements for mobile collaboration across multiple platforms. One of its representative solutions is intelligent information security of enterprise resources for collaboration systems and services. Digital watermarking became a key technology for protecting copyrights. In this article, the authors propose a method of key generation scheme for static visual digital watermarking by using machine learning technology, neural network as its exemplary approach for machine learning method. The proposed method is to provide intelligent mobile collaboration with secure data transactions using machine learning approaches, herein neural network approach as an exemplary technology. First, the proposed method of key generation is to extract certain type of bit patterns in the forms of visual features out of visual objects or data as training data set for machine learning of digital watermark. Second, the proposed method of watermark extraction is processed by presenting visual features of the target visual image into extraction key or herein is a classifier generated in advance by the training approach of machine learning technology. Third, the training approach is to generate the extraction key, which is conditioned to generate watermark signal patterns, only if proper visual features are presented to the classifier. In the proposed method, this classifier which is generated by the machine learning process is used as watermark extraction key. The proposed method is to contribute to secure visual information hiding without losing any detailed data of visual objects or any additional resources of hiding visual objects as molds to embed hidden visual objects. In the experiments, they have shown that our proposed method is robust to high pass filtering and JPEG compression. The proposed method is limited in its applications on the positions of the feature sub-blocks, especially on geometric attacks like shrinking or rotation of the image. DOI: 10.4018/jssoe.2010092103 International Journal of Systems and Service-Oriented Engineering, 1(1), 46-61, January-March 2010 47 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. INTroDUCTIoN In this article, we propose a method of key generation scheme (Figure 1) for static visual digital watermarking (Figure 2) by using machine learning technology, neural network as its exemplary approach for machine learning method. The proposed method is to provide intelligent mobile collaboration with secure data transactions using machine learning approaches, herein neural network approach as an exemplary technology. First, the proposed method of key generation is to extract certain type of bit patterns in the forms of visual features out of visual objects or data as training data set for machine learning of digital watermark. Second, the proposed method of watermark extraction is processed by presenting visual features of the target visual image into extraction key or herein is a classifier generated in advance by the training approach of machine learning technology. Third, the training approach is to generate the extraction key which is conditioned to generate watermark signal patterns only if proper visual features are presented to the classifier. In our proposed method, this classifier which is generated by the machine learning process is used as watermark extraction key. The proposed method is to contribute to secure visual digital watermarking without losing any detailed data of visual objects or any additional resources of hiding visual objects as molds to embed hidden visual objects. The proposed method has used neural network for its training approach not limited but open in its applications to other machine learning approaches including fuzzy, Bayesian network and others. In this article, the target content is a static visual data which are constructed with Figure 1. Key generation scheme in embedding procedure 14 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/article/secure-key-generation-staticvisual/39098?camid=4v1 This title is available in InfoSci-Journals, InfoSci-Journal Disciplines Computer Science, Security, and Information Technology, InfoSci-Computer Systems and Software Engineering eJournal Collection, InfoSci-Digital Marketing, EBusiness, and E-Services eJournal Collection, InfoSciJournal Disciplines Business, Administration, and Management, InfoSci-Journal Disciplines Engineering, Natural, and Physical Science, InfoSci-Select, InfoSciComputer Science and IT Knowledge Solutions – Journals, InfoSci-Business Knowledge Solutions – Journals. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=2
[1]
Charles Adams,et al.
Understanding Public-Key Infra-structure: Concepts, Standards, and Deployment Con-siderations
,
1999
.
[2]
George J. Klir,et al.
Fuzzy sets and fuzzy logic - theory and applications
,
1995
.
[3]
David S. Broomhead,et al.
Multivariable Functional Interpolation and Adaptive Networks
,
1988,
Complex Syst..
[4]
F ROSENBLATT,et al.
The perceptron: a probabilistic model for information storage and organization in the brain.
,
1958,
Psychological review.
[5]
Prashant Krishnamurthy,et al.
Analysis of energy consumption of RC4 and AES algorithms in wireless LANs
,
2003,
GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[6]
George J. Klir,et al.
Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems - Selected Papers by Lotfi A Zadeh
,
1996,
Advances in Fuzzy Systems - Applications and Theory.
[7]
Yoshiyasu Takefuji,et al.
Damageless Information Hiding using Neural Network on YCbCr Domain
,
2008
.
[8]
Ingemar J. Cox,et al.
Watermarking Is Not Cryptography
,
2006,
IWDW.
[9]
Hassan M. Elkamchouchi,et al.
An efficient protocol for authenticated key agreement
,
2011,
2011 28th National Radio Science Conference (NRSC).
[10]
Teuvo Kohonen,et al.
An introduction to neural computing
,
1988,
Neural Networks.
[11]
James L. McClelland,et al.
James L. McClelland, David Rumelhart and the PDP Research Group, Parallel distributed processing: explorations in the microstructure of cognition . Vol. 1. Foundations . Vol. 2. Psychological and biological models . Cambridge MA: M.I.T. Press, 1987.
,
1989,
Journal of Child Language.
[12]
Christophe De Vleeschouwer,et al.
Watermarking algorithm based on a human visual model
,
1998,
Signal Process..
[13]
Shing-Chi Cheung,et al.
The Use of Digital Watermarking for Intelligence Multimedia Document Distribution
,
2008,
J. Theor. Appl. Electron. Commer. Res..
[14]
Christopher M. Bishop,et al.
Pattern Recognition and Machine Learning (Information Science and Statistics)
,
2006
.
[15]
O. Roeva,et al.
Information Hiding: Techniques for Steganography and Digital Watermarking
,
2000
.
[16]
David Kahn,et al.
The History of Steganography
,
1996,
Information Hiding.
[17]
Dickson K. W. Chiu,et al.
Towards ubiquitous tourist service coordination and integration: a multi-agent and semantic web approach
,
2005,
ICEC '05.
[18]
D. Artz,et al.
Digital steganography: hiding data within data
,
2001
.
[19]
Ingemar J. Cox,et al.
Digital Watermarking and Steganography
,
2014
.
[20]
Martin Steinebach,et al.
Complementing DRM with digital watermarking: mark, search, retrieve
,
2007,
Online Inf. Rev..
[21]
Ingemar J. Cox,et al.
Secure spread spectrum watermarking for images, audio and video
,
1996,
Proceedings of 3rd IEEE International Conference on Image Processing.
[22]
Ueli Maurer,et al.
Modelling a Public-Key Infrastructure
,
1996,
ESORICS.
[23]
Shing-Chi Cheung,et al.
Alerts in mobile healthcare applications: requirements and pilot study
,
2004,
IEEE Transactions on Information Technology in Biomedicine.
[24]
J. L. Johnson.
Pulse-coupled neural nets: translation, rotation, scale, distortion, and intensity signal invariance for images.
,
1994,
Applied optics.
[25]
Lakhmi C. Jain,et al.
Introduction to Bayesian Networks
,
2008
.
[26]
Hideyasu Sasaki.
Intellectual Property Protection for Multimedia Information Technology
,
2007
.
[27]
Virgil D. Gligor,et al.
A key-management scheme for distributed sensor networks
,
2002,
CCS '02.
[28]
Corinna Cortes,et al.
Support-Vector Networks
,
1995,
Machine Learning.
[29]
Raymond K. Wong,et al.
End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach
,
2007,
Inf. Syst. Frontiers.
[30]
Shing-Chi Cheung,et al.
Integration of digital rights management into the Internet Open Trading Protocol
,
2003,
Decis. Support Syst..
[31]
Jörg Rothe,et al.
Some facets of complexity theory and cryptography: A five-lecture tutorial
,
2001,
CSUR.
[32]
James L. McClelland,et al.
Parallel distributed processing: explorations in the microstructure of cognition, vol. 1: foundations
,
1986
.
[33]
Heekuck Oh,et al.
Neural Networks for Pattern Recognition
,
1993,
Adv. Comput..
[34]
Jeffrey L. Elman,et al.
Finding Structure in Time
,
1990,
Cogn. Sci..