Continuous media fingerprinting against time-varying collusion attacks

We analyze time-varying collusion attacks over continuous media such as music and movies. Inspired by communication systems, we propose countermeasures for time-varying collusion attacks to improve the performance of the proposed Multi-Carrier Code Division Multiple Access (MC-CDMA)-based fingerprinting system. In this paper, we focus on audio signals as continuous media. We first characterize the audio signals using the just-noticeable-difference (JND) of the human perceptual system model, called the human auditory system (HSA), at the fingerprint embedding, and provide the overall system model of our fingerprinting system as a framework for the analysis of time-varying collusion attacks. Then, we analyze the characteristics of time-varying collusion attacks in terms of their interference to and dynamics on audio. We provide advanced detectors as a countermeasure of interference and interleaving/repetition coding as a countermeasure of variation to improve the performance of the MC-CDMA-based fingerprinting system against time-varying collusion attacks.

[1]  P. Noll,et al.  MPEG digital audio coding , 1997, IEEE Signal Process. Mag..

[2]  B. Sklar,et al.  Rayleigh Fading Channels in Mobile Digital Communication Systems Part II: Mitigation , 1997, IEEE Communications Magazine.

[3]  M. Angela Sasse,et al.  Measuring perceived quality of speech and video in multimedia conferencing applications , 1998, MULTIMEDIA '98.

[4]  SklarB. Rayleigh Fading Channels in Mobile Digital Communication Systems Part II , 1997 .

[5]  C.-C.J. Kuo,et al.  Design of Multiuser Collusion-Free Hiding Codes with Delayed Embedding , 2007 .

[6]  David Tse,et al.  Linear Multiuser Receivers: Effective Interference, Effective Bandwidth and User Capacity , 1999, IEEE Trans. Inf. Theory.

[7]  C.-C. Jay Kuo,et al.  Collusion-Resistant Fingerprinting Systems: Review and Recent Results , 2010, Trans. Data Hiding Multim. Secur..

[8]  Bernd Girod,et al.  Capacity of digital watermarks subjected to an optimal collusion attack , 2000, 2000 10th European Signal Processing Conference.

[9]  C.-C. Jay Kuo,et al.  Design of Collusion-Free Codes Based on MAI-Free Principle , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[10]  Hong Liu,et al.  Attack and improvement of the joint fingerprinting and decryption method for vector quantization images , 2014, Signal Process..

[11]  John Princen,et al.  Analysis/Synthesis filter bank design based on time domain aliasing cancellation , 1986, IEEE Trans. Acoust. Speech Signal Process..

[12]  John D. Villasenor,et al.  Visibility of wavelet quantization noise , 1997, IEEE Transactions on Image Processing.

[13]  John G. Proakis,et al.  Digital Communications , 1983 .

[14]  K. J. Ray Liu,et al.  Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization , 2006, IEEE Transactions on Information Forensics and Security.

[15]  Andrew B. Watson,et al.  DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.

[16]  Lajos Hanzo,et al.  OFDM and MC-CDMA for Broadband Multi-User Communications, WLANs and Broadcasting , 2003 .

[17]  J.B. Allen,et al.  A unified approach to short-time Fourier analysis and synthesis , 1977, Proceedings of the IEEE.

[18]  C.-C. Jay Kuo,et al.  Analysis of time-varying collusion attacks in fingerprinting systems: Capacity and throughput , 2009, 2009 IEEE International Symposium on Circuits and Systems.

[19]  K. J. Ray Liu,et al.  Multimedia Fingerprinting Forensics for Traitor Tracing , 2005 .

[20]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[21]  Asifullah Khan,et al.  A recent survey of reversible watermarking techniques , 2014, Inf. Sci..

[22]  Yacov Yacobi,et al.  Improved Boneh-Shaw Content Fingerprinting , 2001, CT-RSA.

[23]  Julius O. Smith,et al.  Audio representations for data compression and compressed domain processing , 1998 .

[24]  Julius O. Smith,et al.  Audio Watermarking through Deterministic plus Stochastic Signal Decomposition , 2007, EURASIP J. Inf. Secur..

[25]  C.-C. Jay Kuo,et al.  Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks , 2009, IEEE Transactions on Information Forensics and Security.

[26]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[27]  Malay Kumar Kundu,et al.  Perceptually adaptive spread transform image watermarking scheme using Hadamard transform , 2011, Information Sciences.

[28]  Min Wu,et al.  Group-Oriented Fingerprinting for Multimedia Forensics , 2004, EURASIP J. Adv. Signal Process..

[29]  Franco Zambonelli,et al.  A biochemical approach to adaptive service ecosystems , 2010, Inf. Sci..

[30]  C.-C. Jay Kuo,et al.  Design of Collusion-Free Hiding Codes using MAI-Free Principle , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[31]  Gwenaël J Doërr,et al.  Video watermarking : overview and challenges , 2003 .

[32]  Vincenzo Moscato,et al.  Towards a user based recommendation strategy for digital ecosystems , 2013, Knowl. Based Syst..

[33]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[34]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[35]  C.-C. Jay Kuo,et al.  Design and Analysis of High-Capacity Anti-Collusion Hiding Codes , 2008 .

[36]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[37]  D. Kirovski,et al.  Fingerprinting and forensic analysis of multimedia , 2004, MULTIMEDIA '04.

[38]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[39]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.

[40]  Wei Liu,et al.  Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Trans. Inf. Forensics Secur..

[41]  P. Bello Characterization of Randomly Time-Variant Linear Channels , 1963 .

[42]  Min Wu,et al.  Collusion-Resistant Video Fingerprinting for Large User Group , 2007, IEEE Trans. Inf. Forensics Secur..

[43]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[44]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[45]  Nazim Fatès,et al.  StirMark benchmark: audio watermarking attacks , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[46]  P. Moulin,et al.  A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[47]  Min Wu,et al.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.

[48]  Sergio Verdu,et al.  Multiuser Detection , 1998 .

[49]  B. Sklar,et al.  Rayleigh fading channels in mobile digital communication systems Part I: Characterization , 1997, IEEE Commun. Mag..

[50]  Pierre Moulin,et al.  On Optimal Collusion Strategies for Fingerprinting , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[51]  Min Wu,et al.  Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.

[52]  K. J. Ray Liu,et al.  Behavior forensics for scalable multiuser collusion: fairness versus effectiveness , 2006, IEEE Transactions on Information Forensics and Security.

[53]  C.-C. Jay Kuo,et al.  Complexity Reduction of Maximum-Likelihood Multiuser Detection (ML-MUD) Receivers with Carrier Interferometry Codes in MC-CDMA , 2008, 2008 IEEE International Conference on Communications.

[54]  C.-C. Jay Kuo,et al.  Advanced colluder detection techniques for OSIFT-based hiding codes , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[55]  Long Chen,et al.  A high capacity and strong robust fingerprinting for compressed images , 2012, Comput. Electr. Eng..

[56]  G. Carter,et al.  The generalized correlation method for estimation of time delay , 1976 .

[57]  Robert J. Safranek,et al.  Signal compression based on models of human perception , 1993, Proc. IEEE.