Efficient Watermarking Scheme for Traitor Tracing Encryption Schemes

In the content distribution services, traitor tracing encryption schemes are useful tools to trace illegal users that distribute content illegally to unauthorized users. However, solo use of these schemes does not necessarily work well and has vulnerability. To complement the property of the traitor tracing schemes, it is effective to use watermarking scheme with them and the watermarking schemes with light load are required. A number of video watermarking methods with light load have been proposed that embed information into compressed video streams. When the compression scheme is MPEG2-Video, its codes are mostly pre-defined using coding tables, and therefore, information can be embedded in the compressed stream by substituting some of the codes. On the other hand, HEVC/H.265 uses arithmetic coding (CABAC) and it is not easy to substitute one code for another in a stream. To deal with this problem, a watermarking scheme for HEVC/H.265 video streams is proposed. It embeds information while the video is being encoded. A broadcasting system incorporating the scheme is also proposed.

[1]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[2]  Amos Fiat,et al.  Tracing Traitors , 1994, CRYPTO.

[3]  Peijia Zheng,et al.  Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking , 2012, Information Hiding.

[4]  Mark Zhandry,et al.  Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key , 2016, EUROCRYPT.

[5]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[6]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[7]  Jian Cao,et al.  A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness , 2010, Information Hiding.

[8]  Brent Waters,et al.  Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.

[9]  Kazuto Ogawa,et al.  Watermarking for HEVC/H.265 stream , 2015, 2015 IEEE International Conference on Consumer Electronics (ICCE).

[10]  Hideki Imai,et al.  How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services , 2017, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[11]  Heung-Kyu Lee,et al.  Forensic Tracking Watermarking against In-theater Piracy , 2009, Information Hiding.

[12]  Yvo Desmedt,et al.  Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.

[13]  Xiaochun Cao,et al.  Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data , 2012, Information Hiding.

[14]  Kazuto Ogawa,et al.  Watermarking Applications for Broadcast Content Copyright Protection , 2003 .

[15]  Zafar Shahid,et al.  A Watermarking Scheme for High Efficiency Video Coding (HEVC) , 2014, PloS one.

[16]  Moni Naor,et al.  Traitor tracing with constant size ciphertext , 2008, CCS.