Multimedia Content Tracing Scheme Based on Tardos' Fingerprint Codes

Tardos constructed the optimal probabilistic codes that are e-secure against c pirates have length and are full power of randomization. Many improved versions of Tardos’ codes are proposed to shorten its code length while they are still not used in multimedia content. In this paper, the multimedia content tracing scheme based on the Tardos’ fingerprint codes is proposed. Before embedding/extracting the Tardos’ in the multimedia content, the fingerprint bit is modulated/demodulated with spread-spectrum modulation and quantization-index modulation. The collusion resistance of the Tardos’ fingerprint based on the different watermark modulation techniques is analyzed. Simulation results show that based on different watermarking modulation technique the collusion resistance of Tardos’ fingerprint is different.

[1]  Chang-Tsun Li Multimedia Forensics and Security , 2008 .

[2]  Hefei Ling,et al.  A Performance Evaluation of Collusion Attacks in Multimedia Fingerprinting , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[3]  Shiguo Lian,et al.  Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[5]  Min Wu,et al.  Collusion-resistant fingerprinting for multimedia , 2002, IEEE Signal Processing Magazine.

[6]  Shiguo Lian,et al.  On the security of the delay-based fingerprint embedding scheme , 2008, 2008 Third International Conference on Communications and Networking in China.

[7]  Chun-Shien Lu,et al.  AACS-compatible multimedia joint encryption and fingerprinting: Security issues and some solutions , 2008, Signal Process. Image Commun..

[8]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[9]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[10]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[11]  Yongdong Wu,et al.  Linear combination collusion attack and its application on an anti-collusion fingerprinting [image watermarking] , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[12]  Shiguo Lian Secure Multimedia Content Distribution Based on Watermarking Technology , 2009 .

[13]  Min Wu,et al.  Resistance of orthogonal Gaussian fingerprints to collusion attacks , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).