Joint coding and embedding techniques for MultimediaFingerprinting

Digital fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. The collusion attack is a powerful attack where several different fingerprinted copies of the same content are combined together to attenuate or even remove the fingerprints. One major category of collusion-resistant fingerprinting employs an explicit step of coding. Most existing works on coded fingerprinting mainly focus on the code-level issues and treat the embedding issues through abstract assumptions without examining the overall performance. In this paper, we jointly consider the coding and embedding issues for coded fingerprinting systems and examine their performance in terms of collusion resistance, detection computational complexity, and distribution efficiency. Our studies show that coded fingerprinting has efficient detection but rather low collusion resistance. Taking advantage of joint coding and embedding, we propose a permuted subsegment embedding technique and a group-based joint coding and embedding technique to improve the collusion resistance of coded fingerprinting while maintaining its efficient detection. Experimental results show that the number of colluders that the proposed methods can resist is more than three times as many as that of the conventional coded fingerprinting approaches.

[1]  Min Wu,et al.  Group-based joint coding and embedding technique for multimedia fingerprinting , 2005, IS&T/SPIE Electronic Imaging.

[2]  Min Wu,et al.  Group-Oriented Fingerprinting for Multimedia Forensics , 2004, EURASIP J. Adv. Signal Process..

[3]  S. Wicker Error Control Systems for Digital Communication and Storage , 1994 .

[4]  Reihaneh Safavi-Naini,et al.  Traitor Tracing for Shortened and Corrupted Fingerprints , 2002, Digital Rights Management Workshop.

[5]  Tran van Trung,et al.  On a Class of Traceability Codes , 2004, Des. Codes Cryptogr..

[6]  Reihaneh Safavi-Naini,et al.  A 2-Secure Code with Efficient Tracing Algorithm , 2002, INDOCRYPT.

[7]  Alexander Barg,et al.  Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.

[8]  Min Wu,et al.  Collusion-resistant fingerprinting for multimedia , 2002, IEEE Signal Processing Magazine.

[9]  Francis Zane Efficient Watermark Detection and Collusion Security , 2000, Financial Cryptography.

[10]  Yacov Yacobi,et al.  Improved Boneh-Shaw Content Fingerprinting , 2001, CT-RSA.

[11]  Miguel Soriano,et al.  Soft-decision tracing in fingerprinted multimedia content , 2004, IEEE MultiMedia.

[12]  Reihaneh Safavi-Naini,et al.  Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.

[13]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.

[14]  R. L. Fountain,et al.  The fingerprinted database , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.

[15]  Min Wu,et al.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.

[16]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[17]  Min Wu,et al.  PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING , 2004 .

[18]  Jessica Staddon,et al.  Applications of list decoding to tracing traitors , 2003, IEEE Trans. Inf. Theory.

[19]  Catherine A. Meadows,et al.  Fingerprinting Long Forgiving Messages , 1985, CRYPTO.

[20]  Min Wu,et al.  Improving collusion resistance of error correcting code based multimedia fingerprinting , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[21]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[22]  Min Wu,et al.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.

[23]  Hua Wang,et al.  A secure multicast protocol with copyright protection , 2002, CCRV.

[24]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[25]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[26]  Min Wu,et al.  Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..

[27]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..