Skip to main content

Desynchronization in Compression Process for Collusion Resilient Video Fingerprint

  • Conference paper
Digital Watermarking (IWDW 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4283))

Included in the following conference series:

Abstract

Till now, few desynchronization methods for video fingerprint have been presented, which are implemented in raw data. In this paper, a compression compliant video desynchronization method for collusion resilient fingerprint is proposed. The technique can simultaneously apply random space/time desynchronization and compression to videos. In our experiments, with little visual degradation, the joint process costs no more time and bandwidth than those of MPEG2 encoding/decoding. By this method, the video quality degrades dramatically for colluded copies. Besides evaluating the method by compression quality, compression time, and visual quality, we also discussed the system security. Two attacks are considered for the security evaluation: re-synchronization attack (including Most Similar Frame Collusion and Random Similar Frame Replacement) and re-desynchronization attack. Schemes for robustness to these attacks are also shown. Two theorems are presented to point out the security limit of single time desynchronization and single space desynchronization and the influence of related parameters to security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine 21(2), 15–27 (2004)

    Article  Google Scholar 

  2. Zhao, H.V., Liu, K.J.R.: Resistance analysis of scalable video fingerprinting systems under fair collusion attacks. In: IEEE ICIP 2005, Genova, Italy, vol. III, pp. 85–88 (2005)

    Google Scholar 

  3. Wu, Y.D.: Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting. In: IEEE ICASSP, Philadelphia, USA, vol. II, pp. 13–16 (2005)

    Google Scholar 

  4. Su, J.K., Eggers, J.J., Girod, B.: Capacity of digital watermarks subjected to an optimal collusion attacks. In: European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland (2000)

    Google Scholar 

  5. Baaziz, N., Sami, Y.: Attacks on Collusion-Secure Fingerprinting for Multicast Video Protocols. In: International Conference of Distributed Frameworks for Multimedia Applications, DFMA 2005, Besançon, France, pp. 210–216 (2005)

    Google Scholar 

  6. Celik, M.U., Sharma, G., Tekalp, A.M.: Collusion-Resilient Fingerprinting by Random Pre-Warping. IEEE Signal Processing Letters 11(10), 831–835 (2004)

    Article  MATH  Google Scholar 

  7. Mao, Y.N., Mihcak, K.: Collusion-Resistant Intentional De-Synchronization for Digital Video Fingerprinting. In: IEEE ICIP 2005, Genova, Italy, vol. I, pp. 237–240 (2005)

    Google Scholar 

  8. Yu, E., Craver, S.: Fingerprinting with Wow. In: SPIE 18th Annual Symposium of Electronic Imaging, San Jose, California, USA, January 15-19 (2006)

    Google Scholar 

  9. Li, Z., Trappe, W.: Collusion-resistant fingerprints from WBE sequence sets. In: IEEE International Conference on Communications 2005, Seoul, Korea, vol. II, pp. 1336–1340 (2005)

    Google Scholar 

  10. Swaminathan, A., He, S., Wu, M.: Exploring QIM based Anti-Collusion Fingerprinting for Multimedia. In: SPIE Conference on Security, Watermarking and Stegonography, San Jose, California, USA, January 15-19 (2006)

    Google Scholar 

  11. Zhang, J.N., He, Y.W., Yang, S.Q., Zhong, Y.Z.: Performance and complexity joint optimization for H.264 video coding. In: IEEE ISCAS 2003, Bangkok, Thailand, vol. II, pp. 888–891 (2003)

    Google Scholar 

  12. Zhang, J.N., Sun, L.F., Yang, S.Q., Zhong, Y.Z.: Position Prediction Motion-Compensated Interpolation for Frame Rate Up-Conversion Using Temporal Modeling. In: IEEE ICIP 2005, Genova, Italy, vol. I, pp. 53–56 (2005)

    Google Scholar 

  13. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Information Theory 44(5), 1897–1905 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  14. Lin, E.T., Delp, E.J.: Temporal Synchronization in Video Watermarking. IEEE Trans. Signal Processing 52(10), 3007–3022 (2004)

    Article  Google Scholar 

  15. Cayre, F., Fontaine, C., Furon, T.: Watermarking attack: Security of WSS techniques. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 171–183. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  16. Licks, V., Jordan, R.: Geometric Attacks on Image Watermarking Systems. IEEE Multimedia 12(3), 68–78 (2005)

    Article  Google Scholar 

  17. Delannay, D.: Digital Watermarking Algorithms Robust against Loss of Synchronization. Ph.D. thesis (April 2004)

    Google Scholar 

  18. Barni, M.: Coping with Random Bending Attack by Means of Exhaustive Search Detection. In: First Wavila Challenge, WACHA 2005, Barcelona, Spain (June 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Z., Lian, S., Wang, R., Ren, Z. (2006). Desynchronization in Compression Process for Collusion Resilient Video Fingerprint. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_25

Download citation

  • DOI: https://doi.org/10.1007/11922841_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48825-5

  • Online ISBN: 978-3-540-48827-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics