Skip to main content

Scalable Fingerprinting Scheme Using Statistically Secure Anti-collusion Code for Large Scale Contents Distribution

  • Conference paper
Embedded and Ubiquitous Computing (EUC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 4096))

Included in the following conference series:

Abstract

Fingerprinting schemes use digital watermarks to determine originators of unauthorized/pirated copies. Multiple users may collude and collectively escape identification by creating an average or median of their individually watermarked copies. Previous fingerprint code design including ACC (anti-collusion code) cannot support large number of users, which is a common situation in ubiquitous contents distribution environment. We propose a practical scalability solution, which extends previous ACC codebook generation scheme. We design a scalable ACC scheme using a Gaussian distributed random variable to increase the robustness over average and median attack. We implemented our scheme using human visual system based watermarking scheme, and the fingerprinted copy of standard test images show good perceptual quality. The result shows good collusion detection performance over average and median collusion attacks for large scale user population.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yacobi, Y.: Improved Boneh-Shaw content fingerprinting. In: Proc. CTRSA 2001, pp. 378–391 (2001)

    Google Scholar 

  2. Trappe, W., Wu, M., Wangm, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Proc. 51, 1069–1087 (2003)

    Article  Google Scholar 

  3. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44, 1897–1905 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  4. Colbourn, C.J., Dinitz, J.H.: The CRC Handbook of Combinatorial Design. CRC Press, Boca Raton, FL (1996)

    Book  Google Scholar 

  5. Voloshynovskiy, S., Herrige, A., Baumgaertner, N., Pun, T.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–236. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  6. Watson, A.B., Borthwick, R., Taylor, M.: Image quality and Conf. Human Vision, Visual Processing, and Digital Display VI (1997)

    Google Scholar 

  7. Kim, S.W., Suthaharan, S., Lee, H.K., Rao, K.R.: An image watermarking scheme using visual model and BN distribution. IEE Elect. Letter 35(3) (February 1999)

    Google Scholar 

  8. Zhao, H., Wu, M., Wang, J., Ray Liu, K.J.: Nonlinear collusion attacks on independent Fingerprints for multimedia. In: ICASSP, vol. 5, pp. 664–667 (April 2003)

    Google Scholar 

  9. Rohatgi, V.K.: An Introduction to Probability Theory and Mathematical Statistics. John Wiley & Sons, Inc., Chichester (1976)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seol, JM., Kim, SW. (2006). Scalable Fingerprinting Scheme Using Statistically Secure Anti-collusion Code for Large Scale Contents Distribution. In: Sha, E., Han, SK., Xu, CZ., Kim, MH., Yang, L.T., Xiao, B. (eds) Embedded and Ubiquitous Computing. EUC 2006. Lecture Notes in Computer Science, vol 4096. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11802167_57

Download citation

  • DOI: https://doi.org/10.1007/11802167_57

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36679-9

  • Online ISBN: 978-3-540-36681-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics