Anti-collusion fingerprinting for multimedia

Digital fingerprinting is a technique for identifying users who use multimedia content for unintended purposes, such as redistribution. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cost-effective attack against such digital fingerprints is collusion, where several differently marked copies of the same content are combined to disrupt the underlying fingerprints. We investigate the problem of designing fingerprints that can withstand collusion and allow for the identification of colluders. We begin by introducing the collusion problem for additive embedding. We then study the effect that averaging collusion has on orthogonal modulation. We introduce a tree-structured detection algorithm for identifying the fingerprints associated with K colluders that requires O(Klog(n/K)) correlations for a group of n users. We next develop a fingerprinting scheme based on code modulation that does not require as many basis signals as orthogonal modulation. We propose a new class of codes, called anti-collusion codes (ACCs), which have the property that the composition of any subset of K or fewer codevectors is unique. Using this property, we can therefore identify groups of K or fewer colluders. We present a construction of binary-valued ACC under the logical AND operation that uses the theory of combinatorial designs and is suitable for both the on-off keying and antipodal form of binary code modulation. In order to accommodate n users, our code construction requires only O(/spl radic/n) orthogonal signals for a given number of colluders. We introduce three different detection strategies that can be used with our ACC for identifying a suspect set of colluders. We demonstrate the performance of our ACC for fingerprinting multimedia and identifying colluders through experiments using Gaussian signals and real images.

[1]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[2]  Ilan Ziskind,et al.  Maximum likelihood localization of multiple sources by alternating projection , 1988, IEEE Trans. Acoust. Speech Signal Process..

[3]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[4]  Min Wu,et al.  Collusion-resistant fingerprinting for multimedia , 2002, IEEE Signal Processing Magazine.

[5]  Thierry Pun,et al.  Optimal adaptive diversity watermarking with channel state estimation , 2001, IS&T/SPIE Electronic Imaging.

[6]  Douglas R Stinson,et al.  Contemporary design theory : a collection of surveys , 1992 .

[7]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[8]  Robert E. Tarjan,et al.  Resistance of digital watermarks to collusive attacks , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[9]  Min Wu,et al.  Modulation and multiplexing techniques for multimedia data hiding , 2001, SPIE ITCom.

[10]  Ding-Zhu Du,et al.  Competitive Group Testing , 1993, Discret. Appl. Math..

[11]  Min Wu,et al.  Multi-level data hiding for digital image and video , 1999, Optics East.

[12]  Birgit Pfitzmann,et al.  Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.

[13]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[14]  H. Vincent Poor,et al.  An introduction to signal detection and estimation (2nd ed.) , 1994 .

[15]  H. Niederreiter,et al.  Introduction to finite fields and their applications: Factorization of Polynomials , 1994 .

[16]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.

[17]  Richard J. Vaccaro,et al.  A least-squares algorithm for multipath time-delay estimation , 1994, IEEE Trans. Signal Process..

[18]  C. Colbourn,et al.  CRC Handbook of Combinatorial Designs , 1996 .

[19]  Guoliang Xue,et al.  Modifications of Competitive Group Testing , 1994, SIAM J. Comput..

[20]  Bernd Girod,et al.  Capacity of digital watermarks subjected to an optimal collusion attack , 2000, 2000 10th European Signal Processing Conference.

[21]  D. Kirovski,et al.  A dual watermarking and fingerprinting system , 2002, Proceedings IEEE International Symposium on Information Theory,.

[22]  Yoram Bresler,et al.  Maximum likelihood parameter estimation of superimposed signals by dynamic programming , 1993, IEEE Trans. Signal Process..

[23]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[24]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[25]  Min Wu,et al.  Multimedia Data Hiding , 2003, Springer New York.

[26]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[27]  Thierry Pun,et al.  Secure Copyright Protection Techniques for Digital Images , 1998, Information Hiding.

[28]  Jan-Olof Gustavsson Detection in Non-Gaussian Noise , 1993 .

[29]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[30]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[31]  Jörg Schwenk,et al.  Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.

[32]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[33]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[34]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[35]  Javed A. Aslam,et al.  Searching in the presence of linearly bounded errors , 1991, STOC '91.

[36]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..