Fingerprinting Compressed Multimedia Signals

Digital fingerprinting is a technique to deter unauthorized redistribution of multimedia content by embedding a unique identifying signal in each legally distributed copy. The embedded fingerprint can later be extracted and used to trace the originator of an unauthorized copy. A group of users may collude and attempt to create a version of the content that cannot be traced back to any of them. As multimedia data is commonly stored in compressed form, this paper addresses the problem of fingerprinting compressed signals. Analysis is carried out to show that due to the quantized nature of the host signal and the embedded fingerprint, directly extending traditional fingerprinting techniques for uncompressed signals to the compressed case leads to low collusion resistance. To overcome this problem and improve the collusion resistance, a new technique for fingerprinting compressed signals called Anti-Collusion Dither (ACD) is proposed, whereby a random dither signal is added to the compressed host before embedding so as to make the effective host signal appear more continuous. The proposed technique is shown to reduce the accuracy with which attackers can estimate the host signal, and from an information theoretic perspective, the proposed ACD technique increases the maximum number of users that can be supported by the fingerprinting system under a given attack. Both analytical and experimental studies confirm that the proposed technique increases the probability of identifying a guilty user and can approximately quadruple the collusion resistance compared to conventional Gaussian fingerprinting.

[1]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[2]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[3]  P. Moulin,et al.  A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[4]  Min Wu,et al.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.

[5]  Lawrence A. Rowe,et al.  DCT coefficient distributions , 1996, Electronic Imaging.

[6]  K. J. Ray Liu,et al.  Fingerprint multicast in secure video streaming , 2006, IEEE Transactions on Image Processing.

[7]  Min Wu,et al.  Collusion-resistant fingerprinting for multimedia , 2002, IEEE Signal Processing Magazine.

[8]  Steve Mitchell,et al.  The long march to interoperable digital rights management , 2004, Proceedings of the IEEE.

[9]  Reginald L. Lagendijk,et al.  Optimal differential energy watermarking of DCT encoded images and video , 2001, IEEE Trans. Image Process..

[10]  Yacov Yacobi,et al.  Improved Boneh-Shaw Content Fingerprinting , 2001, CT-RSA.

[11]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[12]  Min Wu,et al.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.

[13]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[14]  Pierre Moulin,et al.  Capacity and Random-Coding Error Exponent for Public Fingerprinting Game , 2006, 2006 IEEE International Symposium on Information Theory.

[15]  Min Wu,et al.  Exploring QIM-based anti-collusion fingerprinting for multimedia , 2006, Electronic Imaging.

[16]  Min Wu,et al.  Collusion-Resistant Fingerprinting for Compressed Multimedia Signals , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[17]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[18]  Min Wu,et al.  Collusion-Resistant Video Fingerprinting for Large User Group , 2006, IEEE Transactions on Information Forensics and Security.

[19]  Neri Merhav,et al.  On the capacity game of private fingerprinting systems under collusion attacks , 2003, IEEE Transactions on Information Theory.

[20]  Bernd Girod,et al.  Capacity of digital watermarks subjected to an optimal collusion attack , 2000, 2000 10th European Signal Processing Conference.

[21]  Pierre Moulin,et al.  Universal fingerprinting: Capacity and random-coding exponents , 2008, 2008 IEEE International Symposium on Information Theory.

[22]  Min Wu,et al.  Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.

[23]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[24]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[25]  Reihaneh Safavi-Naini,et al.  Digital Rights Management for Content Distribution , 2003, ACSW.

[26]  Joseph W. Goodman,et al.  A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..

[27]  Min Wu,et al.  Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia , 2007, 2007 IEEE International Conference on Image Processing.

[28]  Reihaneh Safavi-Naini,et al.  Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.