skip to main content
10.1145/1073170.1073194acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Building efficient and effective multimedia fingerprints via joint coding and embedding

Published: 01 August 2005 Publication History

Abstract

Digital fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. One major category of collusion-resistant fingerprinting employs an explicit step of coding. Most existing works on coded fingerprinting mainly focus on the code-level issues and treat the embedding issues through abstract assumptions without examining the overall performance. In this paper, we jointly consider the coding and embedding issues for coded fingerprinting systems and examine their performance in terms of collusion resistance, detection computational complexity, and distribution efficiency. Our studies show that coded fingerprinting has efficient detection but rather low collusion resistance. Taking advantage of joint coding and embedding, we propose two new techniques, namely, a Permuted Subsegment Embedding technique and a Group-based Joint Coding and Embedding (GRACE) technique, to improve the collusion resistance of coded fingerprinting while maintaining its efficient detection. Experimental results show that the number of colluders that the proposed methods can resist is more than three times as many as that of the conventional coded fingerprinting approaches.

References

[1]
F. Ergun, J. Kilian and R. Kumar, "A Note on the limits of Collusion-Resistant Watermarks", Eurocrypt '99, 1999.
[2]
Z.J. Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R. Liu, "Anti-Collusion Forensics of Multimedia Fingerprinting Using Orthogonal Modulation," IEEE Trans. on Image Proc., 14(6), pp.804--821, 2005.
[3]
I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia", IEEE Trans. on Image Processing, 6(12), pp.1673--1687, 1997.
[4]
D. Boneh and J. Shaw, "Collusion-secure Fingerprinting for Digital Data," IEEE Tran. on Info. Theory, 44(5), pp. 1897--1905, 1998.
[5]
Y. Yacobi, "Improved Boneh-Shaw Content Fingerprinting", CT-RSA 2001, LNCS 2020, pp. 378--391, 2001.
[6]
W. Trappe, M. Wu, Z.J. Wang, and K.J.R. Liu, "Anti-collusion Fingerprinting for Multimedia", IEEE Trans. on Sig. Proc., 51(4), pp1069--1087, 2003.
[7]
D. To, R. Safavi-Naini and Y. Wang, "A 2-secure code with efficient tracing algorithm", Progress in Cryptology - INDOCRYPT'02, Lecture Notes in Computer Science, Vol. 2551, Springer-Verlag, pp. 149--162, 2002.
[8]
A. Barg, G.R. Blakley and G. Kabatiansky "Digital fingerprinting codes: Problem statements, constructions, identification of traitors" IEEE Trans. Info. Theory, 49(4), pp. 852--865, April 2003.
[9]
R. Safavi-Naini and Y. Wang, "Collusion Secure q-ary Fingerprinting for Perceptual Content," Security and Privacy in Digital Rights Management (SPDRM'01), pp. 57--75, 2002.
[10]
M. Fernandez, and M. Soriano, "Soft-Decision Tracing in Fingerprinted Multimedia Content", IEEE Multimedia, Vol.11 No.2, pp38--46, April-June 2004.
[11]
S. He and M. Wu, "Performance Study of ECC-based Collusion-resistant Multimedia Fingerprinting," in Proceedings of the 38th CISS, March 2004, pp. 827--832.
[12]
J.N. Staddon, D. R. Stinson, and R. Wei, "Combinatorial Properties of Frameproof and Traceability Codes", IEEE Trans. on Info. Theory, vol. 47, no. 3, pp 1042--1049, 2001.
[13]
M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu, "Collusion Resistant Fingerprinting for Multimedia", IEEE Signal Processing Magazine,pp 15--27, March, 2004.
[14]
H. Chu, L. Qiao, and K. Nahrstedt, "A secure Multicast Protocol with Copyright Protection", ACM SIGCOMM Computer Communications Review, vol. 32, no. 2, April 2002.
[15]
M. Wu and B. Liu, "Data Hiding in Image and Video: Part-I -- Fundamental Issues and Solutions", IEEE Trans. on Image Proc., vol.12, no.6, pp.685--695, June 2003.
[16]
Z.J. Wang, M. Wu, W. Trappe, and K.J.R. Liu, "Group-Oriented Fingerprinting for Multimedia Forensics," EURASIP Journal on Applied Signal Processing, vol.2004:14, pp.2153--2173, October 2004.

Cited By

View all
  • (2012)A collusion attack optimization strategy for digital fingerprintingACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)10.1145/2344436.23444428:2S(1-20)Online publication date: 20-Sep-2012

Index Terms

  1. Building efficient and effective multimedia fingerprints via joint coding and embedding

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM&Sec '05: Proceedings of the 7th workshop on Multimedia and security
    August 2005
    164 pages
    ISBN:1595930329
    DOI:10.1145/1073170
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 August 2005

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. collusion resistance
    2. error correcting code
    3. multimedia fingerprinting

    Qualifiers

    • Article

    Conference

    MM&Sec '05
    Sponsor:
    MM&Sec '05: Multimedia and Security Workshop 2005
    August 1 - 2, 2005
    NY, New York, USA

    Acceptance Rates

    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2012)A collusion attack optimization strategy for digital fingerprintingACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)10.1145/2344436.23444428:2S(1-20)Online publication date: 20-Sep-2012

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media