Noise-Resistant Joint Fingerprinting and Decryption Based on Vector Quantization

With the popularity of the Internet and development of multimedia technology, media distribution and traitor tracing issues have become critical and urgent. In this paper, a joint fingerprinting and decryption (JFD) scheme based on vector quantization for protecting media distribution is proposed. Before transmission, the proposed method encrypts plain-images using permutation and codeword substitution on the sender side. The decryption key, which is used to decode image and to present a user’s identity, is stored in advance in the receiver’s device, such as a set-top box or iPod player. When the subscriber receives the encrypted images, these images are jointly decrypted and fingerprinted and are slightly different from original images. The proposed method, to the best of our knowledge, is the first JFD method for VQ compressed images. The experimental results show that the encrypted image possesses unintelligibility and the recovered image has desirable image quality resistant to noise interference.

[1]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[2]  Bernd Girod,et al.  Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[3]  Colin Perkins,et al.  Watercasting: Distributed Watermarking of Multicast Media , 1999, Networked Group Communication.

[4]  Zengqiang Chen,et al.  Image encryption based on a new total shuffling algorithm , 2008 .

[5]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[6]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[7]  Stefan Katzenbeisser,et al.  Secure Watermark Embedding Through Partial Encryption , 2006, IWDW.

[8]  Jian Ma,et al.  Perceptual video encryption scheme for mobile application based on H.264 , 2008 .

[9]  A. Murat Tekalp,et al.  Collusion-resilient fingerprinting using random prewarping , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[10]  Robert M. Gray,et al.  An Algorithm for Vector Quantizer Design , 1980, IEEE Trans. Commun..

[11]  Shuguo Yang,et al.  A video encryption method based on chaotic maps in DCT domain , 2008 .

[12]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[13]  Michiel H. M. Smid,et al.  An optimal algorithm for the on-line closest-pair problem , 2005, Algorithmica.

[14]  R. Gray,et al.  Vector quantization , 1984, IEEE ASSP Magazine.

[15]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[16]  Charalampos Manifavas,et al.  Chameleon - A New Kind of Stream Cipher , 1997, FSE.

[17]  Stefan Katzenbeisser,et al.  Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks , 2008, IEEE Transactions on Information Forensics and Security.

[18]  Chin-Chen Chang,et al.  A progressive codebook training algorithm for image vector quantization , 1999, Fifth Asia-Pacific Conference on ... and Fourth Optoelectronics and Communications Conference on Communications,.

[19]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[20]  A. Murat Tekalp,et al.  Collusion-resilient fingerprinting by random pre-warping , 2004, IEEE Signal Processing Letters.

[21]  Chin-Chen Chang,et al.  Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes , 2007, IEEE Transactions on Information Forensics and Security.

[22]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[23]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[24]  Guanrong Chen,et al.  A chaos-based image encryption algorithm with variable control parameters , 2009 .

[25]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..

[26]  Chin-Chen Chang,et al.  Reversible steganographic method using SMVQ approach based on declustering , 2007, Inf. Sci..

[27]  Shiguo Lian,et al.  Secure advanced video coding based on selective encryption algorithms , 2006, IEEE Trans. Consumer Electron..

[28]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[29]  ChangChin-Chen,et al.  Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes , 2007 .