Results 1 - 10
of
106
Data-Hiding Codes
- Proc. IEEE
, 2005
"... This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics, and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital m ..."
Abstract
-
Cited by 58 (4 self)
- Add to MetaCart
This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics, and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital media, content authentication, media forensics, data binding, and covert communications. Some of these applications imply the presence of an adversary attempting to disrupt the transmission of information to the receiver; other applications involve a noisy, generally unknown, communication channel. Our focus is on the mathematical models, fundamental principles, and code design techniques that are applicable to data hiding. The approach draws from basic concepts in information theory, coding theory, game theory, and signal processing, and is illustrated with applications to the problem of hiding data in images. Keywords—Coding theory, data hiding, game theory, image processing, information theory, security, signal processing, watermarking. I.
Video fingerprinting and encryption principles for digital rights management
- Proceedings of the IEEE
, 2004
"... This paper provides a tutorial and survey of digital fingerprinting and video scrambling algorithms based on partial encryption. Necessary design tradeoffs for algorithm development are highlighted for multicast communication environments. We also propose a novel architecture for joint fingerprintin ..."
Abstract
-
Cited by 35 (0 self)
- Add to MetaCart
This paper provides a tutorial and survey of digital fingerprinting and video scrambling algorithms based on partial encryption. Necessary design tradeoffs for algorithm development are highlighted for multicast communication environments. We also propose a novel architecture for joint fingerprinting and decryption that holds promise for a better compromise between practicality and security for emerging digital rights management applications. Keywords—Digital fingerprinting tutorial, digital video encryption survey, joint fingerprinting and decryption (JFD), video scrambling. I.
AntiCollusion Forensics of Multimedia Fingerprinting Using Orthogonal Modulation
- IEEE Trans. Image Process
, 2005
"... Abstract—Digital fingerprinting is a method for protecting digital data in which fingerprints that are embedded in multimedia are capable of identifying unauthorized use of digital content. A powerful attack that can be employed to reduce this tracing capability is collusion, where several users com ..."
Abstract
-
Cited by 35 (14 self)
- Add to MetaCart
(Show Context)
Abstract—Digital fingerprinting is a method for protecting digital data in which fingerprints that are embedded in multimedia are capable of identifying unauthorized use of digital content. A powerful attack that can be employed to reduce this tracing capability is collusion, where several users combine their copies of the same content to attenuate/remove the original fingerprints. In this paper, we study the collusion resistance of a fingerprinting system employing Gaussian distributed fingerprints and orthogonal modulation. We introduce the maximum detector and the thresholding detector for colluder identification. We then analyze the collusion resistance of a system to the averaging collusion attack for the performance criteria represented by the probability of a false negative and the probability of a false positive. Lower and upper bounds for the maximum number of colluders �— � are derived. We then show that the detectors are robust to different collusion attacks. We further study different sets of performance criteria, and our results indicate that attacks based on a few dozen independent copies can confound such a fingerprinting system. We also propose a likelihood-based approach to estimate the number of colluders. Finally, we demonstrate the performance for detecting colluders through experiments using real images. Index Terms—Colluder detection, collusion attacks, collusion resistance, digital fingerprinting, spread spectrum embedding. I.
Group-Oriented Fingerprinting for Multimedia Forensics
- EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING 2004:14, 2142–2162 C ○ 2004 HINDAWI PUBLISHING CORPORATION
, 2004
"... Digital fingerprinting of multimedia data involves embedding information in the content signal and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprinting is collusion, whereby ..."
Abstract
-
Cited by 29 (18 self)
- Add to MetaCart
Digital fingerprinting of multimedia data involves embedding information in the content signal and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprinting is collusion, whereby a group of adversaries combine their individual copies in an attempt to remove the underlying fingerprints. Former studies indicate that collusion attacks based on a few dozen independent copies can confound a fingerprinting system that employs orthogonal modulation. However, in practice an adversary is more likely to collude with some users than with other users due to geographic or social circumstances. To take advantage of prior knowledge of the collusion pattern, we propose a two tier group-oriented fingerprinting scheme where users likely to collude with each other are assigned correlated fingerprints. Additionally, we extend our construction to represent the natural social and geographic hierarchical relationships between users by developing a more flexible tree structure-based fingerprinting system. We also propose a multistage colluder identification scheme by taking advantage of the hierarchial nature of the fingerprints. We evaluate the performance of the proposed fingerprinting scheme by studying the collusion resistance of a fingerprinting system employing Gaussian-distributed fingerprints. Our results show that the group-oriented fingerprinting system provides the superior collusion resistance over a system employing orthogonal
Fingerprinting protocol for images based on additive homomorphic property
- IEEE Transactions on Image Processing
"... Abstract—Homomorphic property of public-key cryptosystems is applied for several cryptographic protocols, such as electronic cash, voting system, bidding protocols, etc. Several fingerprinting protocols also exploit the property to achieve an asymmetric system. However, their enciphering rate is ext ..."
Abstract
-
Cited by 28 (1 self)
- Add to MetaCart
(Show Context)
Abstract—Homomorphic property of public-key cryptosystems is applied for several cryptographic protocols, such as electronic cash, voting system, bidding protocols, etc. Several fingerprinting protocols also exploit the property to achieve an asymmetric system. However, their enciphering rate is extremely low and the implementation of watermarking technique is difficult. In this paper, we propose a new fingerprinting protocol applying additive homomorphic property of Okamoto–Uchiyama encryption scheme. Exploiting the property ingenuously, the enciphering rate of our fingerprinting scheme can be close to the corresponding cryptosystem. We study the problem of implementation of watermarking technique and propose a successful method to embed an encrypted information without knowing the plain value. The security can also be protected for both a buyer and a merchant in our scheme. Index Terms—Additive homomorphic property, enciphering rate, fingerprinting protocol, quantization method, watermark. I.
Statistical Invisibility for Collusion-resistant Digital Video Watermarking
- IEEE Trans. Multimedia
, 2005
"... Abstract—In this paper, we present a theoretical framework for the linear collusion analysis of watermarked digital video sequences, and derive a new theorem equating a definition of statistical invisibility, collusion-resistance, and two practical watermark design rules. The proposed framework is s ..."
Abstract
-
Cited by 28 (3 self)
- Add to MetaCart
Abstract—In this paper, we present a theoretical framework for the linear collusion analysis of watermarked digital video sequences, and derive a new theorem equating a definition of statistical invisibility, collusion-resistance, and two practical watermark design rules. The proposed framework is simple and intuitive; the basic processing unit is the video frame and we consider secondorder statistical descriptions of their temporal inter-relationships. Within this analytical setup, we define the linear frame collusion attack, the analytic notion of a statistically invisible video watermark, and show that the latter is an effective counterattack against the former. Finally, to show how the theoretical results detailed in this paper can easily be applied to the construction of collusion-resistant video watermarks, we encapsulate the analysis into two practical video watermark design rules that play a key role in the subsequent development of a novel collusion-resistant video watermarking algorithm discussed in a companion paper. Index Terms—Linear collusion, robust imperceptible digital video watermarking, statistical invisibility, watermarking attack. I.
Collusion-Resistant Fingerprinting for Multimedia
, 2004
"... A broad overview of the recent advances in multimedia fingerprinting for tracing and identifying colluders. Ensuring that digital content is used for its intended purpose after it has been delivered to customers often requires the ability to track and identify entities involved in unauthorized redis ..."
Abstract
-
Cited by 27 (2 self)
- Add to MetaCart
A broad overview of the recent advances in multimedia fingerprinting for tracing and identifying colluders. Ensuring that digital content is used for its intended purpose after it has been delivered to customers often requires the ability to track and identify entities involved in unauthorized redistribution of multimedia content. Digital fingerprinting is a technology for enforcing digital rights policies whereby unique labels, known as digital fingerprints, are inserted into content prior to distribution. As illustrated in Figure 1, unique fingerprints are assigned to each intended recipient. These fingerprints can facilitate the tracing of the culprits who use their content for unintended purposes. To protect the content, it is necessary that the fingerprints are difficult to remove from the content. For multimedia content, fingerprints can be embedded using conventional watermarking techniques that are typically concerned with robustness against a variety of attacks mounted by an individual. Guaranteeing the appropriate use of multimedia content, however, is no longer a traditional security issue with a single adversary. The global nature of the Internet has brought adversaries closer to each other. It is now easy for a group of users with differently marked versions of the same content to work together and collectively mount attacks against the fingerprints. These attacks, known as multiuser collusion attacks, provide a cost-effective method for attenuating each of the colluders ’ fingerprints. An improperly designed embedding and identification scheme may be vulnerable in the sense that a small coalition of colluders can successfully produce a new version of the content with no detectable traces. Thus, collusion poses a real threat to protecting media data and enforcing usage policies. It is desirable, therefore, to design fingerprints that resist collusion and identify the colluders.
Data hiding in image and video: Part I—Fundamental issues and solutions
- IEEE Trans. Image Processing
, 2003
"... a number of fundamental issues of data hiding in image and video and propose general solutions to them. We begin with a review of two major types of embedding, based on which we propose a new multilevel embedding framework to allow the amount of extractable data to be adaptive according to the actua ..."
Abstract
-
Cited by 22 (8 self)
- Add to MetaCart
(Show Context)
a number of fundamental issues of data hiding in image and video and propose general solutions to them. We begin with a review of two major types of embedding, based on which we propose a new multilevel embedding framework to allow the amount of extractable data to be adaptive according to the actual noise condition. We then study the issues of hiding multiple bits through a comparison of various modulation and multiplexing techniques. Finally, the nonstationary nature of visual signals leads to highly uneven distribution of embedding capacity and causes difficulty in data hiding. We propose an adaptive solution switching between using constant embedding rate with shuffling and using variable embedding rate with embedded control bits. We verify the effectiveness of our proposed solutions through analysis and simulation. And Part II [1] will apply these solutions to specific design problems for embedding data in grayscale and color images and video. Index Terms—Data hiding, digital watermarking, embedding capacity, modulation and multiplexing, shuffle. I.
Collusion resistance of multimedia fingerprinting using orthogonal modulation
- IEEE Trans. on Image Proc
, 2005
"... Digital fingerprints are unique labels inserted in different copies of the same content before distribution. Each digital fingerprint is assigned to an intended recipient, and can be used to trace the culprits who use their content for unintended purposes. Attacks mounted by multiple users, known as ..."
Abstract
-
Cited by 15 (7 self)
- Add to MetaCart
(Show Context)
Digital fingerprints are unique labels inserted in different copies of the same content before distribution. Each digital fingerprint is assigned to an intended recipient, and can be used to trace the culprits who use their content for unintended purposes. Attacks mounted by multiple users, known as collusion attacks, provide a cost-effective method for attenuating the identifying fingerprint from each colluder, thus collusion poses a real challenge to protect the digital media data and enforce usage policies. This paper examines a few major design methodologies for collusion-resistant fingerprinting of multimedia, and presents a unified framework that helps highlight the common issues and the uniqueness of different fingerprinting techniques.
Behavior forensics for scalable multiuser collusion: Fairness versus effectiveness
- IEEE Trans. Inf. Forensics Security
, 2006
"... Abstract—Multimedia security systems involve many users with different objectives and users influence each other’s performance. To have a better understanding of multimedia security systems and offer stronger protection of multimedia, behavior forensics formulate the dynamics among users and investi ..."
Abstract
-
Cited by 14 (11 self)
- Add to MetaCart
(Show Context)
Abstract—Multimedia security systems involve many users with different objectives and users influence each other’s performance. To have a better understanding of multimedia security systems and offer stronger protection of multimedia, behavior forensics formulate the dynamics among users and investigate how they interact with and respond to each other. This paper analyzes the behavior forensics in multimedia fingerprinting and formulates the dynamics among attackers during multi-user collusion. In particular, this paper focuses on how colluders achieve the fair play of collusion and guarantee that all attackers share the same risk (i.e., the probability of being detected). We first analyze how to distribute the risk evenly among colluders when they receive fingerprinted copies of scalable resolutions due to network and device heterogeneity. We show that generating a colluded copy of higher resolution puts more severe constraints on achieving fairness. We then analyze the effectiveness of fair collusion. Our results indicate that the attackers take a larger risk of being captured when the colluded copy has higher resolution, and they have to take this tradeoff into consideration during collusion. Finally, we analyze the collusion resistance of the scalable fingerprinting systems in various scenarios with different system requirements, and evaluate the maximum number of colluders that the fingerprinting systems can withstand. Index Terms—Behavior forensics, collusion resistance, fairness, scalable multiuser collusion, traitor tracing. I.