Traitor tracing over YouTube video service—proof of concept

The development explained in this article proves that is possible to trace dishonest users who upload videos with sensitive content to the YouTube service. To achieve tracing these traitor users, fingerprint marks are embedded by a watermarking algorithm into each copy of the video before distributing it. Our experiments show that if the watermarking algorithm is carefully configured and the fingerprints are correctly chosen, the traitor, or a member of a set of traitors who have performed a collusion attack, can be found from a pirate video uploaded to the YouTube service.

[1]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[2]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[3]  Taekyung Kim,et al.  Fast informed embedding in dirty-paper trellis-code with orthogonal arcs , 2006, MCPS '06.

[4]  Min Wu,et al.  Collusion-Resistant Video Fingerprinting for Large User Group , 2006, IEEE Transactions on Information Forensics and Security.

[5]  Sergey Ioffe,et al.  Permutation grouping: intelligent Hash function design for audio & image retrieval , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[6]  Ingemar J. Cox,et al.  Dirty-paper trellis codes for watermarking , 2002, Proceedings. International Conference on Image Processing.

[7]  Juan Hernández-Serrano,et al.  Multimedia Copyright Protection Platform Demonstrator , 2005, iTrust.

[8]  Shumeet Baluja,et al.  Audio Fingerprinting: Combining Computer Vision & Data Stream Processing , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[9]  Ingemar J. Cox,et al.  Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.

[10]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[11]  Alexander Barg,et al.  Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.

[12]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[13]  Ingemar J. Cox,et al.  Informed Embedding for Multi-bit Watermarks , 2002, IWDW.

[14]  Shumeet Baluja,et al.  Known-Audio Detection using Waveprint: Spectrogram Fingerprinting by Wavelet Hashing , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[15]  Joan Tomàs-Buliart,et al.  Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems , 2007, KES.

[16]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[17]  Miguel Soriano,et al.  Fingerprinting Concatenated Codes with Efficient Identification , 2002, ISC.

[18]  Sergey Yekhanin,et al.  Towards 3-query locally decodable codes of subexponential length , 2008, JACM.

[19]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.

[20]  Min Wu,et al.  Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.

[21]  Josep Domingo-Ferrer,et al.  Simple collusion-secure fingerprinting schemes for images , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).