Skip to main content

Iterative Detection Method for CDMA-Based Fingerprinting Scheme

  • Conference paper
Information Hiding (IH 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5284))

Included in the following conference series:

  • 827 Accesses

Abstract

Digital fingerprinting of multimedia data involves embedding information in the content signal and offers the traceability of illegal users who distribute unauthorized copies. One potential threat to fingerprinting system is collusion, whereby a group of users combines their individual copies in an attempt to remove the underlying fingerprints. Hayashi et. al have proposed hierarchical fingerprinting scheme using the CDMA technique which designed a fingerprint signal by a combination of quasi-orthogonal sequences to increase the allowable number of users. In this paper, we formalize the model of collusion from the viewpoint of a communication channel, and propose a removal operation considering the interference among fingerprints. We also explore the characteristic of the proposed detector and the effects of the removal operation on a detection sequence. By introducing two kinds of thresholds for the determination of the presence of fingerprints, the performance of the proposed detector is enhanced effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wu, M., Trappe, W., Wang, Z., Liu, K.J.R.: Collusion resistant fingerprinting for multimedia. IEEE Signal Processing Mag., 15–27 (2004)

    Google Scholar 

  2. Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  3. Cox, I., Kilian, J., Leighton, F., Shamson, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(5), 1673–1687 (1997)

    Article  Google Scholar 

  4. Zhao, H., Wu, M., Wang, Z., Liu, K.J.R.: Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. IEEE Trans. Image Process. 14(5), 646–661 (2005)

    Article  Google Scholar 

  5. Wang, Z.J., Wu, M., Trappe, W., Liu, K.J.R.: Group-oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process. (14), 2142–2162 (2004)

    Google Scholar 

  6. Wang, Z.J., Wu, M., Zhao, H., Trappe, W., Liu, K.J.R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulatio. IEEE Trans. Image Process. 14(6), 804–821 (2005)

    Article  Google Scholar 

  7. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5), 1897–1905 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  8. Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 51(4), 1069–1087 (2003)

    Article  MathSciNet  Google Scholar 

  9. Zhu, Y., Feng, D., Zou, W.: Collusion secure convolutional spread spectrum fingerprinting. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 67–83. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Tardos, G.: Optimal probabilistic fingerprint codes. In: Proc. 35th ACM Symp. Theory of Comp., pp. 116–125 (2003)

    Google Scholar 

  11. Hayashi, N., Kuribayashi, M., Morii, M.: Collusion-resistant fingerprinting scheme based on the CDMA-technique. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 28–43. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions. IEEE Trans. Infom. Theory 14(1), 154–156 (1968)

    Article  MATH  Google Scholar 

  13. Stone, H.: Analysis of attacks on image watermarks with randomized coefficients. NEC Res. Inst., Tech. Rep. 96–045 (1996)

    Google Scholar 

  14. Rao, K.R., Yip, P.: Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic Press, Boston (1990)

    Book  MATH  Google Scholar 

  15. Barni, M., Bartolini, F., Piva, A.: Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. on Image Process. 10(5), 783–791 (2001)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kuribayashi, M., Morii, M. (2008). Iterative Detection Method for CDMA-Based Fingerprinting Scheme. In: Solanki, K., Sullivan, K., Madhow, U. (eds) Information Hiding. IH 2008. Lecture Notes in Computer Science, vol 5284. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88961-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88961-8_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88960-1

  • Online ISBN: 978-3-540-88961-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics