Group-oriented and Collusion Secure Fingerprint for Digital Images

Digital fingerprinting is a technique for identifying unauthorized copy and tracing back to its user. The distributor marks each individual copy with a unique fingerprint. The present fingerprinting scheme s generally ha ve many difficulties and disadvantages in the case of large-size users. In this paper , we present a new fingerprint scheme which can be used in confidential departments where there are a limited number of users. This scheme is composed of an outer RS (Reed-Solomon) code and an inner code based on BIBD (balanced incomplete block design) code and orthogonal code . We first construct inner code matrix based on BIBD block and orthogonal code. Since the BIBD code just has good performance in resisting linear collusion attacks, we expand the inner code to improve inner code’s ability of resisting nonlinear collusion attacks. In reality , the probabilities of participation in collusion in different combinations of users vary . So we group inner codeword into subsets and distribute each subset to a group of users. The code scheme turns into a type of group-oriented fingerprint which is favorable to trace colluders and to avoid involving innocent users. Then we take the inner codeword as the RS code’s symbols and make the outer code satisfy the request of resisting collusion attacks. In the end, by concatenating inner and outer code, we get the final fingerprint. The p erformance of the algorithm s is proved and analyzed by theory. Compared with traditional codes for digital fingerprint, under the same collusion size and error probability, our scheme shortens digital fingerprint length significantly, and test experiments confirm the code’s ability of resisting collusion attacks.

[1]  Alexander Vardy,et al.  Algebraic soft-decision decoding of Reed-Solomon codes , 2003, IEEE Trans. Inf. Theory.

[2]  Josep Domingo-Ferrer,et al.  Simple collusion-secure fingerprinting schemes for images , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[3]  Jörg Schwenk,et al.  Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.

[4]  Robert E. Tarjan,et al.  Resistance of digital watermarks to collusive attacks , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[5]  Wade Trappe,et al.  Collusion-resistant fingerprints from WBE sequence sets , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[6]  Amirhossein Taherinia,et al.  A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising , 2009, 2009 International Conference on Availability, Reliability and Security.

[7]  Reihaneh Safavi-Naini,et al.  A 2-Secure Code with Efficient Tracing Algorithm , 2002, INDOCRYPT.

[8]  Hideki Imai,et al.  An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths , 2007, AAECC.

[9]  Alexander Vardy,et al.  Bit-level soft-decision decoding of Reed-Solomon codes , 1991, IEEE Trans. Commun..

[10]  Min Wu,et al.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.

[11]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[12]  N. Wiberg,et al.  Random codes for digital fingerprinting , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[13]  Alexander Barg,et al.  Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.

[14]  Francis Zane Efficient Watermark Detection and Collusion Security , 2000, Financial Cryptography.

[15]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[16]  Min Wu,et al.  Group-Oriented Fingerprinting for Multimedia Forensics , 2004, EURASIP J. Adv. Signal Process..

[17]  Josep Domingo-Ferrer,et al.  Collusion-secure and cost-effective detection of unlawful multimedia redistribution , 2003, IEEE Trans. Syst. Man Cybern. Part C.

[18]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.