Traceable Content Distribution Using Wavelet Decomposition and Social Network Analysis

This paper identifies a novel secure content distribution framework based on wavelet decomposition and social network. The motivation is to facilitate trace illegally distributed content by using mapping between hierarchical community of social network and wavelet tree. Firstly, the host signal is encrypted, then the encrypted contents are delivered to users according to social network analysis, at last, the contents are fingerprinted with decryption on the receiving side to get many different copies. Fingerprints which are constructed with social network analysis are embedded in wavelet domain. The use of fingerprinting along with encryption can provide a double-layer of protection to digital media. Theory analysis proves that the proposed framework has significantly better performance than traditional content distribution mode. Experimental results prove that the proposed technique is not only resilient to collusion attacks, but also consume much less CPU time to trace colluders.

[1]  Shiguo Lian,et al.  Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[3]  Miguel Soriano,et al.  Traitor tracing over YouTube video service—proof of concept , 2010, Telecommun. Syst..

[4]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[5]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[6]  Aylin Kantarci,et al.  Bandwidth-effective streaming of educational medical videos , 2010, Multimedia Systems.

[7]  Edward J. Delp,et al.  Advances in Digital Video Content Protection , 2005, Proceedings of the IEEE.

[8]  Md Anwar Hussain,et al.  Coded Fingerprinting Based Watermarking to Resist Collusion Attacks and Trace Colluders , 2010, 2010 International Conference on Advances in Computer Engineering.

[9]  Qiaoliang Li,et al.  Asymmetric fingerprinting based on 1-out-of-n oblivious transfer , 2010, IEEE Communications Letters.