Abstract
Till now, few desynchronization methods for video fingerprint have been presented, which are implemented in raw data. In this paper, a compression compliant video desynchronization method for collusion resilient fingerprint is proposed. The technique can simultaneously apply random space/time desynchronization and compression to videos. In our experiments, with little visual degradation, the joint process costs no more time and bandwidth than those of MPEG2 encoding/decoding. By this method, the video quality degrades dramatically for colluded copies. Besides evaluating the method by compression quality, compression time, and visual quality, we also discussed the system security. Two attacks are considered for the security evaluation: re-synchronization attack (including Most Similar Frame Collusion and Random Similar Frame Replacement) and re-desynchronization attack. Schemes for robustness to these attacks are also shown. Two theorems are presented to point out the security limit of single time desynchronization and single space desynchronization and the influence of related parameters to security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine 21(2), 15–27 (2004)
Zhao, H.V., Liu, K.J.R.: Resistance analysis of scalable video fingerprinting systems under fair collusion attacks. In: IEEE ICIP 2005, Genova, Italy, vol. III, pp. 85–88 (2005)
Wu, Y.D.: Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting. In: IEEE ICASSP, Philadelphia, USA, vol. II, pp. 13–16 (2005)
Su, J.K., Eggers, J.J., Girod, B.: Capacity of digital watermarks subjected to an optimal collusion attacks. In: European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland (2000)
Baaziz, N., Sami, Y.: Attacks on Collusion-Secure Fingerprinting for Multicast Video Protocols. In: International Conference of Distributed Frameworks for Multimedia Applications, DFMA 2005, Besançon, France, pp. 210–216 (2005)
Celik, M.U., Sharma, G., Tekalp, A.M.: Collusion-Resilient Fingerprinting by Random Pre-Warping. IEEE Signal Processing Letters 11(10), 831–835 (2004)
Mao, Y.N., Mihcak, K.: Collusion-Resistant Intentional De-Synchronization for Digital Video Fingerprinting. In: IEEE ICIP 2005, Genova, Italy, vol. I, pp. 237–240 (2005)
Yu, E., Craver, S.: Fingerprinting with Wow. In: SPIE 18th Annual Symposium of Electronic Imaging, San Jose, California, USA, January 15-19 (2006)
Li, Z., Trappe, W.: Collusion-resistant fingerprints from WBE sequence sets. In: IEEE International Conference on Communications 2005, Seoul, Korea, vol. II, pp. 1336–1340 (2005)
Swaminathan, A., He, S., Wu, M.: Exploring QIM based Anti-Collusion Fingerprinting for Multimedia. In: SPIE Conference on Security, Watermarking and Stegonography, San Jose, California, USA, January 15-19 (2006)
Zhang, J.N., He, Y.W., Yang, S.Q., Zhong, Y.Z.: Performance and complexity joint optimization for H.264 video coding. In: IEEE ISCAS 2003, Bangkok, Thailand, vol. II, pp. 888–891 (2003)
Zhang, J.N., Sun, L.F., Yang, S.Q., Zhong, Y.Z.: Position Prediction Motion-Compensated Interpolation for Frame Rate Up-Conversion Using Temporal Modeling. In: IEEE ICIP 2005, Genova, Italy, vol. I, pp. 53–56 (2005)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Information Theory 44(5), 1897–1905 (1998)
Lin, E.T., Delp, E.J.: Temporal Synchronization in Video Watermarking. IEEE Trans. Signal Processing 52(10), 3007–3022 (2004)
Cayre, F., Fontaine, C., Furon, T.: Watermarking attack: Security of WSS techniques. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 171–183. Springer, Heidelberg (2005)
Licks, V., Jordan, R.: Geometric Attacks on Image Watermarking Systems. IEEE Multimedia 12(3), 68–78 (2005)
Delannay, D.: Digital Watermarking Algorithms Robust against Loss of Synchronization. Ph.D. thesis (April 2004)
Barni, M.: Coping with Random Bending Attack by Means of Exhaustive Search Detection. In: First Wavila Challenge, WACHA 2005, Barcelona, Spain (June 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, Z., Lian, S., Wang, R., Ren, Z. (2006). Desynchronization in Compression Process for Collusion Resilient Video Fingerprint. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_25
Download citation
DOI: https://doi.org/10.1007/11922841_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48825-5
Online ISBN: 978-3-540-48827-9
eBook Packages: Computer ScienceComputer Science (R0)