Private and blind digital fingerprinting schemes based upon complete complementary codes

Complete complementary code is a family of the spread spectrum sequences with good correlation properties. In this study, the properties of the private and the blind digital fingerprinting schemes using complete complementary codes were evaluated. It is revealed that the proposed scheme is sufficiently robust against collusion attacks by employing a large embedding coefficient in the private case. In addition, in the blind case where the source image cannot be referred to, it was shown that the robustness against collusion attacks could be improved by applying a method called QIM (quantization index modulation) and employing a set of appropriate parameters.

[1]  Naoki Hayashi,et al.  Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique , 2007, IWSEC.

[2]  Tetsuya Kojima,et al.  On digital watermarks based on complete complementary codes , 2009, 2009 Fourth International Workshop on Signal Design and its Applications in Communications.

[3]  Tetsuya Kojima,et al.  Properties of a Convoluted-Time and Code Division Multiple Access Communication Systems Based upon Complete Complementary Codes , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[4]  Tetsuya Kojima,et al.  On Some Properties of a Digital Watermarking Based on Complete Complementary Codes , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[5]  Tetsuya Kojima A blind digital fingerprinting scheme based on complete complementary codes , 2011 .

[6]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[7]  Tetsuya Kojima,et al.  Comparison of the signal design methods in the CDMA systems using complete complementary codes , 2004 .

[8]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[9]  Naoki Suehiro,et al.  N-shift cross-orthogonal sequences , 1988, IEEE Trans. Inf. Theory.

[10]  Tetsuya Kojima,et al.  A Blind Digital Steganography Scheme Based on Complete Complementary Codes , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[11]  Minoru Kuribayashi,et al.  Interference Removal Operation for Spread Spectrum Fingerprinting Scheme , 2012, IEEE Transactions on Information Forensics and Security.