Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection

The prime objective in this paper is to explore the possibility of combining the seemingly orthogonal processes of watermarking and encryption along the spirit of the chameleon cipher. By integrating perceptual models indirectly through a ’weeding’ process and collusion resistant coding methodologies in the design of the decryption keys, we have shown that it is possible to embed a robust yet relatively imperceptible fingerprint at the receiver. We have also provided some insights into the softening of the encryption process due to the enforcement of additional perceptual constraints because of fingerprinting.

[1]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[2]  Robert J. Safranek,et al.  Signal compression based on models of human perception , 1993, Proc. IEEE.

[3]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[4]  Charalampos Manifavas,et al.  Chameleon - A New Kind of Stream Cipher , 1997, FSE.

[5]  C.-C. Jay Kuo,et al.  Efficient multimedia encryption via entropy codec design , 2001, IS&T/SPIE Electronic Imaging.

[6]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..

[7]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[8]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[9]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[10]  Bülent Sankur,et al.  1 2 3 4 5 6 7 8 , 2000 .

[11]  Lei Tang,et al.  Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.

[12]  Mostafa H. Ammar,et al.  WHIM: watermarking multicast video with a hierarchy of intermediaries , 2002, Comput. Networks.

[13]  Roland Parviainen,et al.  Large Scale distributed watermarking of multicast media through encryption , 2001, Communications and Multimedia Security.

[14]  Ton Kalker,et al.  A Highly Robust Audio Fingerprinting System , 2002, ISMIR.

[15]  Miodrag Potkonjak,et al.  Fingerprinting Digital Circuits on Programmable Hardware , 1998, Information Hiding.

[16]  Shiguo Lian,et al.  Comparison of several wavelet coefficient confusion methods applied in multimedia encryption , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..

[17]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.