Coded Fingerprinting Based Watermarking to Resist Collusion Attacks and Trace Colluders

The alteration, repackaging, and redistribution of multimedia content like image, video, audio, etc. poses a serious threat to both national security and commercial markets. Presently with the growing popularity of digital media the world is becoming smaller and smaller. That is mainly due to the internet connectivity and WWW phenomena. But the copyright protection of intellectual properties has become a necessity for prevention of illegal copying and verification of content integrity. Here wavelet transform plays the role of an efficient and robust tool due to its multi-resolution capability along with singular value decomposition (SVD) for watermarking. Both of these when implemented with coded fingerprinting not only resist collusion attacks but can also help tracing colluders. This work here by focuses implementation of a hybrid watermarking scheme using SVD and wavelet transform along with coded fingerprinting developed for protection of the intellectual property.

[1]  Swanirbhar Majumder,et al.  A Hybrid SVD and Wavelet based Watermarking , 2008 .

[2]  Swanirbhar Majumder,et al.  SVD and Neural Network Based Watermarking Scheme , 2010, BAIP.

[3]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[4]  S. Sarkar,et al.  SVD and Lifting Wavelet Based Fragile Image Watermarking , 2010 .

[5]  Min Wu,et al.  Group-Oriented Fingerprinting for Multimedia Forensics , 2004, EURASIP J. Adv. Signal Process..

[6]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[7]  Swanirbhar Majumder,et al.  SVD and Error Control Coding Based Digital Image Watermarking , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[8]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[9]  Min Wu,et al.  Multimedia Data Hiding , 2003, Springer New York.

[10]  Min Wu,et al.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.

[11]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[12]  C. Colbourn,et al.  The CRC handbook of combinatorial designs , edited by Charles J. Colbourn and Jeffrey H. Dinitz. Pp. 784. $89.95. 1996. ISBN 0-8493-8948-8 (CRC). , 1997, The Mathematical Gazette.