A collusion-resistant fingerprinting system for restricted distribution of digital documents (original) (raw)

Fingerprinting Codes for Multimedia Data against Averaging Attack

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009

Code construction for digital fingerprinting, which is a copyright protection technique for multimedia, is considered. Digital fingerprinting should deter collusion attacks, where several fingerprinted copies of the same content are mixed to disturb their fingerprints. In this paper, we consider the averaging attack, which is known to be effective for multimedia fingerprinting with the spread spectrum technique. We propose new methods for constructing fingerprinting codes to increase the coding rate of conventional fingerprinting codes, while they guarantee to identify the same number of colluders. Due to the new fingerprinting codes, the system can deal with a larger number of users to supply digital contents.

Multimedia content screening using a dual watermarking and fingerprinting system

Proceedings of the tenth ACM international conference on Multimedia - MULTIMEDIA '02, 2002

We present a new dual watermarking and fingerprinting system, where initially all copies of a protected object are identically watermarked using a secret key, but individual detection keys are distinct. By knowing a detection key, an adversary cannot recreate the original content from the watermarked content. However, knowledge of any one detection key is sufficient for modifying the object so that a detector using that key would fail to detect the marks. Detectors using other detection keys would not be fooled, and such a modified object necessarily contains enough information about the broken detector key-the fingerprint. Our dual system limits the scope of possible attacks, when compared to classic fingerprinting systems. Under optimal attacks, the size of the collusion necessary to remove the marks without leaving a detectable fingerprint is superlinear in object size, whereas classic fingerprinting has a lower bound on collusion resistance that is approximately fourth root in object size. By using our scheme one can achieve collusion resistance of up to 900,000 users for a two hour high-definition video.

Collusion-secure fingerprinting for digital data

IEEE Transactions on Information Theory, 1998

This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data, e.g., software, documents, music, and video. Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trace it back to the user. This threat of detection will deter users from releasing unauthorized copies. A problem arises when users collude: for digital data, two different fingerprinted objects can be compared and the differences between them detected. Hence, a set of users can collude to detect the location of the fingerprint. They can then alter the fingerprint to mask their identities. We present a general fingerprinting solution which is secure in the context of collusion. In addition, we discuss methods for distributing fingerprinted data.

Collusion resistant fingerprinting of digital audio

Proceedings of the 4th …, 2011

Digital fingerprinting is a technique for tracing the distribution of multimedia content, and protecting it from unauthorized manipulation. Unique identification information is embedded into each distributed copy of the signal. In a collusion attack, fingerprints are combined to remove or distort the fingerprints. Audio signals are good candidates for fingerprinting, because of the forgiving nature of the human auditory system to cross-talk between channels. We use principal components of the audio signal to construct an abstract vector space. The fingerprints are ordered rotations in that space. The rotations are determined by arrays with good correlation properties. These arrays are embedded in real audio, and are imperceptible, according to a panel of experts. These fingerprints are resistant to an averaging collusion attack by hundreds or thousands of colluders, and can withstand a worst case RandNeg attack by up to 30 colluders.

Application of Digital Fingerprinting: Duplicate Image Detection

2016

Identifying the content automatically is the most necessary condition to detect and fight piracy. Watermarking the image is the most basic and common technique to fight piracy. But the effectiveness of watermark is limited. Image fingerprinting provides an alternate and efficient solution for managing and identifying the multimedia content. After registering the original image contents, by comparing the colluded image with the original one, the percentage of distortion can be calculated. In this paper presented are one such fingerprinting-based forensic application: Duplicate image detection. To authenticate image content perceptual hash is an efficient solution. Perceptual hashes of almost similar images or near duplicate images are very similar to each other making it easier to compare images unlike cryptographic hashes which vary very radically even in the case of small distortions. Potential applications are unlimited including digital forensics, protection of copyrighted materi...

Collusion-Resistant Audio Fingerprinting System in the Modulated Complex Lapped Transform Domain

PLoS ONE, 2013

Collusion-resistant fingerprinting paradigm seems to be a practical solution to the piracy problem as it allows media owners to detect any unauthorized copy and trace it back to the dishonest users. Despite the billionaire losses in the music industry, most of the collusion-resistant fingerprinting systems are devoted to digital images and very few to audio signals. In this paper, state-of-the-art collusion-resistant fingerprinting ideas are extended to audio signals and the corresponding parameters and operation conditions are proposed. Moreover, in order to carry out fingerprint detection using just a fraction of the pirate audio clip, block-based embedding and its corresponding detector is proposed. Extensive simulations show the robustness of the proposed system against average collusion attack. Moreover, by using an efficient Fast Fourier Transform core and standard computer machines it is shown that the proposed system is suitable for real-world scenarios.

Hardware implementation of a fingerprinting algorithm suited for digital cinema

2004

This paper presents the performance evaluation of a watermarking algorithm, an image and video processing technique used for Digital Right Management. Software developments are largely used in image copyright applications but there is a lack of real time applications for video. A previous work in image watermarking was already done and proposed a new algorithm with very interesting security properties. Nevertheless, the software implementation of this watermarking scheme showed some restrictions concerning real time applications. Hence, we propose to extend the previous paper with a lighter version of the algorithm and a complete hardware implementation allowing us to deal with high throughput image/video applications, such as digital cinema.

Content Based Fingerprinting for Video Copyright Detection System

2012

Security of a fingerprinting system is important for certain applications such as copyright protections, for this reason secure version of the fingerprinting system for video piracy detection is presented. The proposed system relies on a fingerprint extraction algorithm followed by a fast approximate search algorithm for video piracy detection. The fingerprint extraction algorithm extracts content based signatures from special images constructed from the video. Each such image represents a short segment of the video and contains temporal as well as spatial information about the video segment. These images are denoted by temporally informative representative images. To find whether a query video is copied from a video in a video database, the fingerprints of all the videos in the database are extracted and stored in advance. The search algorithm searches the stored fingerprints to find close enough matches for the fingerprints of the query video. The proposed algorithm is designed an...

Anti-Piracy for Movies using Forensic Watermarking

In the past decade internet worked perfectly with distribution of the digital data for pictures, music and videos. Although digital data have many advantages over analogue data, the rightful ownership of the digital data source is at of risk. The copyright protection for digital media becomes an important issue of piracy. Watermarking is a very important field for copyrights of various electronic documents and multimedia. This paper presents a digital forensic watermarking method for authorization against copying or piracy of digital video. The core idea is to use biometric generated keys in the embedding process of watermark. The host video is first randomized by Heisenberg decomposition and Discrete Fourier Transform (DFT). The invisible watermark is embedded in the I-frame of the host video. The watermarks are embedded in the least significant bit (LSB) of the each block. The forensic watermark provides “The Chain of Custody” throughout the life cycle of the video distribution. The experimental result of test sequence demonstrates that the proposed work gives high security and robustness