Skip to main content

Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 13052))

Abstract

Securing multimedia content and preventing it from being maliciously manipulated has developed at a rapid pace, and researchers have been studying the traitor tracing as an appropriate solution. This approach consists in retrieving back the actors who contributed to the construction of an illegal release of a multimedia product. It includes two major steps which are the fingerprinting step and the tracing one. The fingerprinting step relies on the watermarking technique whereas the efficiency of the tracing scheme depends on several requirements: the robustness of the watermarking technique, the type of the media content, and even the computational complexity. In this paper, we propose a new collusion-secure fingerprinting scheme for 3D videos. It has essentially a twofold purpose: at a first step, we propose to embed the watermark in the video copy by applying a standard Least Significant Bit (LSB) substitution to all the frames of both the 2D video and the depth map components in order to ensure simultaneously and independently the protection of these two parts. In the second step, we apply the tracing process whose target is the identification of eventual colluders by extracting the hidden identifier from the suspicious video and analyse it. Experimental assessments show that the proposed scheme provides interesting results in terms of speed and tracing accuracy constraints.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. de Rosnay, M.D.: Digital rights management systems and European law: between copyright protection and access control. In: Second International Conference on Web Delivering of Music, 2002. WEDELMUSIC 2002. Proceedings, pp. 117–124 (2002)

    Google Scholar 

  2. Thilagavathi, N., Saravanan, D., Kumarakrishnan, S., Punniakodi, S., Amudhavel, J., Prabu, U.: A survey of reversible watermarking techniques, application and attacks. In: Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015), ICARCSET 2015. Association for Computing Machinery, New York (2015) https://doi.org/10.1145/2743065.2743102

  3. Lee, M., Lee, J., Lee, H.: Perceptual watermarking for 3d stereoscopic video using depth information. In: 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 81–84 (2011)

    Google Scholar 

  4. Kim, H., Lee, J., Oh, T., Lee, H.: Robust DT-CWT watermarking for DIBR 3D images. IEEE Trans. Broadcast. 58(4), 533–543 (2012)

    Article  Google Scholar 

  5. Sheng-Li, F., Mei, Y., Gang-Yi, J., Feng, S., Zong-Ju, P., Sheng-li, F.: A digital watermarking algorithm based on region of interest for 3D image. In: Eighth International Conference on Computational Intelligence and Security 2012, pp. 549–552 (2012)

    Google Scholar 

  6. Lin, Y., Wu, J.: Unseen visible watermarking for color plus depth map 3D images. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1801–1804 (2012)

    Google Scholar 

  7. Liu, X., Zhao, R., Li, F., Liao, S., Ding, Y., Zou, B.: Novel robust zero-watermarking scheme for digital rights management of 3D videos. Signal Process. Image Commun. 54, 140–151 (2017). http://www.sciencedirect.com/science/article/pii/S0923596517300371

  8. Pei, S.-C., Wang, Y.-Y.: A new 3D unseen visible watermarking and its applications to multimedia. In: 2014 IEEE 3rd Global Conference on Consumer Electronics, GCCE 2014, pp. 140–143, February 2015

    Google Scholar 

  9. Gao, G., Jiang, G.: Bessel-fourier moment-based robust image zero-watermarking. Multimedia Tools Appl. 74(3), 841–858 (2015). https://doi.org/10.1007/s11042-013-1701-8

  10. Abdelhedi, K., Chaabane, F., Ben Amar, C.: A SVM-based zero-watermarking technique for 3D videos traitor tracing. In: Blanc-Talon, J., Delmas, P., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2020. LNCS, vol. 12002, pp. 373–383. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-40605-9_32

    Chapter  Google Scholar 

  11. He, S., Wu, M.: Collusion-resistant video fingerprinting for large user group. IEEE Trans. Inf. Forensics Secur. 2(4), 697–709 (2007)

    Article  Google Scholar 

  12. Tardos, G.: Optimal probabilistic fingerprint codes. J. ACM 55(2) (2008). https://doi.org/10.1145/1346330.1346335

  13. Peikert, C., Shelat, A., Smith, A.: Lower bounds for collusion-secure fingerprinting. In: SODA 2003, pp. 472–479, January 2003

    Google Scholar 

  14. Chaabane, F., Charfeddine, M., Puech, W., Ben Amar, C.: Towards a blind map-based traitor tracing scheme for hierarchical fingerprints. Neural Inf. Process. 11, 505–512 (2015)

    Google Scholar 

  15. Chaabane, F., Charfeddine, M., Puech, W., Ben Amaf, C.: A QR-code based audio watermarking technique for tracing traitors. In: 2015 23rd European Signal Processing Conference (EUSIPCO), pp. 51–55 (2015)

    Google Scholar 

  16. Craver, S., Memon, N., Yeo, B., Yeung, M.M.: Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE J. Sel. Areas Commun. 16(4), 573–586 (1998)

    Article  Google Scholar 

  17. Desoubeaux, M., Guelvouit, G.L., Puech, W.: Fast detection of Tardos codes withboneh-shaw types. In: SPIE 8303, Media Watermarking, Security, and Forensics (2012). http://www.rmit3dv.com

  18. El’arbi, M., Amar, C.B., Nicolas, H.: Video watermarking based on neural networks. In: IEEE International Conference on Multimedia and Expo 2006, pp. 1577–1580 (2006)

    Google Scholar 

  19. Fernandez, M., Soriano, M., Cotrina, J.: Tracing illegal redistribution using errors-anderasures and side information decoding algorithms. Inf. Secur. IET 1, 83–90 (2007)

    Google Scholar 

  20. Furon, T., Pérez-Freire, L.: Worst case attacks against binary probabilistic traitor tracing codes. In: First IEEE International Workshop on Information Forensics and Security (WIFS) 2009, pp. 56–60 (2009)

    Google Scholar 

  21. Chaabane, F., Charfeddine, M., Ben Amar, C.: An enhanced hierarchical traitor tracing scheme based on clustering algorithms, pp. 379–390, June 2017

    Google Scholar 

  22. Hayashi, N., Kuribayashi, M., Morii, M.: Collusion-resistant fingerprinting scheme based on the CDMA-technique. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 28–43. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-75651-4_3

    Chapter  Google Scholar 

  23. Chaabane, F., Charfeddine, M., Puech, W., Amar, C.B.: A two-stage traitor tracing scheme for hierarchical fingerprints. Multimedia Tools Appl. 76(12), 14 405–14435 (2017). https://doi.org/10.1007/s11042-016-3749-8

  24. Wagner, N.R.: Fingerprinting. In: Proceedings of the 1983 IEEE Symposium on Security and Privacy, Oakland, California, USA, 25–27 April 1983. IEEE Computer Society, 1983, pp. 18–22. https://doi.org/10.1109/SP.1983.10018

  25. Chaabane, F., Charfeddine, M., Ben Amar, C.: A survey on digital tracing traitors schemes. In: 2013 9th International Conference on Information Assurance and Security (IAS), pp. 85–90 (2013)

    Google Scholar 

  26. Sharma, V., Shrivastava, V.: A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection. J. Theor. Appl. Inf. Technol. 36, 1–8 (2012)

    Google Scholar 

  27. Cheng, E., Burton, P., Burton, J., Joseski, A., Burnett, I.: RMIT3DV: pre-announcement of a creative commons uncompressed HD 3D video database. In: 2012 Fourth International Workshop on Quality of Multimedia Experience, pp. 212–217 (2012)

    Google Scholar 

  28. Scharstein, D., Szeliski, R., Zabih, R.: A taxonomy and evaluation of dense two-frame stereo correspondence algorithms. In: Proceedings IEEE Workshop on Stereo and Multi-Baseline Vision (SMBV 2001), pp. 131–140 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abdelhedi, K., Chaabane, F., Puech, W., Amar, C.B. (2021). Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video. In: Tsapatsoulis, N., Panayides, A., Theocharides, T., Lanitis, A., Pattichis, C., Vento, M. (eds) Computer Analysis of Images and Patterns. CAIP 2021. Lecture Notes in Computer Science(), vol 13052. Springer, Cham. https://doi.org/10.1007/978-3-030-89128-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-89128-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-89127-5

  • Online ISBN: 978-3-030-89128-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics