Local and global structure preserving hashing for fast digital fingerprint tracing

Digital fingerprinting is a promising approach to protect multimedia contents from unauthorized redistribution. Whereas, large scale and high dimensionality make existing fingerprint detection methods fail to trace the traitors efficiently. To handle this problem, we propose a novel local and global structure preserving hashing to conduct fast fingerprint detection. This is the first work that introduces hash-based similarity search method to perform fingerprint detection. Applying the hashing method, we obtain a neighborhood-preserving low-dimensional representation (e. g. hash code) for each fingerprint. Through hash codes, we can find the nearest neighbors of the extracted fingerprint, thereby tracing the real traitors within a small range. Preserving the local structure facilitates to find the nearest neighbors of the query fingerprint efficiently, and preserving the global structure ensures hash codes of fingerprints as discriminative as possible. These properties make the proposed approach efficient to trace the real traitors. Extensive experiments demonstrate that the proposed approach outperforms traditional linear scan detection methods in term of efficiency.

[1]  Min Wu,et al.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.

[2]  Min Wu,et al.  Group-Oriented Fingerprinting for Multimedia Forensics , 2004, EURASIP J. Adv. Signal Process..

[3]  J. A. Hartigan,et al.  A k-means clustering algorithm , 1979 .

[4]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[5]  Wei Liu,et al.  Hashing with Graphs , 2011, ICML.

[6]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[7]  Min Wu,et al.  Performance of detection statistics under collusion attacks on independent multimedia fingerprints , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[8]  Geoffrey E. Hinton,et al.  Semantic hashing , 2009, Int. J. Approx. Reason..

[9]  Ling Huang,et al.  Fast approximate spectral clustering , 2009, KDD.

[10]  Jun Wang,et al.  Self-taught hashing for fast similarity search , 2010, SIGIR.

[11]  Jay Yagnik,et al.  SPEC hashing: Similarity preserving algorithm for entropy-based coding , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[12]  Alexander Barg,et al.  Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.

[13]  Min Wu,et al.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.

[14]  Jörg Schwenk,et al.  Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.

[15]  Jörg Schwenk,et al.  Combining digital watermarks and collusion-secure fingerprints for digital images , 1999, Electronic Imaging.

[16]  Xinlei Chen,et al.  Large Scale Spectral Clustering with Landmark-Based Representation , 2011, AAAI.

[17]  Nicole Immorlica,et al.  Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.

[18]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[19]  Antonio Torralba,et al.  Spectral Hashing , 2008, NIPS.

[20]  Reihaneh Safavi-Naini,et al.  A 2-Secure Code with Efficient Tracing Algorithm , 2002, INDOCRYPT.

[21]  Jon Louis Bentley,et al.  An Algorithm for Finding Best Matches in Logarithmic Expected Time , 1977, TOMS.

[22]  Trevor Darrell,et al.  Learning to Hash with Binary Reconstructive Embeddings , 2009, NIPS.

[23]  C.-C. Jay Kuo,et al.  Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks , 2009, IEEE Transactions on Information Forensics and Security.

[24]  Rong Jin,et al.  Random Projection with Filtering for Nearly Duplicate Search , 2012, AAAI.

[25]  Hefei Ling,et al.  A Novel Collusion Attack Strategy for Digital Fingerprinting , 2010, IWDW.

[26]  Antonin Guttman,et al.  R-trees: a dynamic index structure for spatial searching , 1984, SIGMOD '84.

[27]  Min Wu,et al.  Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.

[28]  Wenjun Zeng,et al.  A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..

[29]  Atsushi Imiya,et al.  Fast Spectral Clustering with Random Projection and Sampling , 2009, MLDM.