Skip to main content

WBE-Based Anti-collusion Fingerprints: Design and Detection

  • Chapter
Intelligent Multimedia Analysis for Security Applications

Part of the book series: Studies in Computational Intelligence ((SCI,volume 282))

Summary

Digital fingerprinting is a technique whereby a unique digital fingerprint associated with each legitimate user is hidden in the multimedia content so that consumers who redistribute the content illegally can be traced. Typically, robust watermarking techniques are used to embed digital fingerprints in order to provide resilience to a variety of processing attacks. However, one cost-effective strategy to attack digital fingerprints is collusion, where several colluders average their individual copies to disrupt the underlying fingerprints. Recently, a new class of fingerprinting codes, called anti-collusion codes (ACC), was proposed for use with code-modulated data embedding. Two important issues need to be considered when designing ACC: accommodating as many users as possible for a given fingerprint dimensionality, and identifying the colluders effectively from the colluded signal. In this chapter, we identify an underlying similarity between the colluder detection problem and the multiuser detection problem from code division multiple access (CDMA). We propose that fingerprints can be constructed using sequence sets satisfying the Welch Bound Equality (WBE). In order to identify the colluders when employing WBE-based ACC, we further propose a powerful detection algorithm utilizing sphere decoding to identify the colluders from the colluded signal. We compare our WBE-ACC against orthogonal fingerprints and BIBD-based anti-collusion codes via simulations, and show that the proposed WBE-based ACC and detection algorithm gives a better performance than the BIBD-based ACC under the same configuration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ajtai, M.: The shortest vector problem in L2 is NP-hard for randomized reductions. In: Proceedings of the 30rd ACM Symposium on Theory of Computing, May 1998, pp. 10–19 (1998)

    Google Scholar 

  2. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Tran. on Information Theory 44, 1897–1905 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  3. Chan, A., Lee, I.: A new reduced-complexity sphere decoder for multiple antenna systems communications. In: IEEE International Conference on Communications, April 2002, vol. 1, pp. 460–464 (2002)

    Google Scholar 

  4. Cox, I., Bloom, J., Miller, M.: Digital Watermarking: Principles & Practice. Morgan Kaufmann, San Francisco (2001)

    Google Scholar 

  5. Cox, I., Kilian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Tran. on Image Proc. 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  6. Dayal, P., Varanasi, M.K.: A fast generalized sphere decoder for optimum decoding of under-determined mimo systems. In: Proceedings of 41st Annual Allerton Conf. on Comm. Control, and Comput., Monticello, IL (October 2003)

    Google Scholar 

  7. Ergun, F., Kilian, J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)

    Google Scholar 

  8. Fincke, U., Pohst, M.: Improved methods for calculating vectors of short length in a lattice, including a complexity analysis. Mathematics of Computation 44, 463–471 (1985)

    Article  MATH  MathSciNet  Google Scholar 

  9. H235 ITR: Security and encryption for H-series (H.323 and other H.245-based) multimedia terminals (November 2000)

    Google Scholar 

  10. Hassibi, B., Vikalo, H.: Maximum-likelihood decoding and integer least-squares: the expected complexity. In: Foschini, J., Verdu, S. (eds.) Multiantenna Channels: Capacity, Coding and Signal Processing. AMS

    Google Scholar 

  11. Hassibi, B., Vikalo, H.: On sphere decoding algorithm. i. expected complexity. IEEE Transactions on Signal Processing 53, 2806–2818 (2005)

    Article  MathSciNet  Google Scholar 

  12. Massey, J.L., Mittelholzer, T.: Welch’s bound and sequence sets for code-division multiple access systems. In: Capocelli, R., DeSantis, A., Vaccaro, U. (eds.) Sequences II, Methods in Communication, Security and Computer Science, pp. 63–78. Springer, New York (1993)

    Google Scholar 

  13. Karystinos, G.N., Pados, D.A.: New bounds on the total squared correlation and optimum design of ds-cdma binary signature sets. IEEE Trans. on Communications 51, 48–51 (2003)

    Article  Google Scholar 

  14. Kilian, J., Leighton, T., Matheson, L.R., Shamoon, T.G., Tarjan, R.E., Zane, F.: Resistance of digital watermarks to collusive attacks. Tech. Rep. TR-585-98, Department of Computer Science, Princeton University (1998)

    Google Scholar 

  15. Damen, M., Abed-Meraim, K., Belfiore, J.-C.: Generalised sphere decoder for asymmetrical space-time communication architecture. Electronics Letters 36, 166–167

    Google Scholar 

  16. Celik, M.U., Sharma, G., Tekalp, A.M.: Collusion-resilient fingerprinting using random prewarping. In: Proceedings, International Conference on Image Processing, vol. 1, pp. 509–512 (2003)

    Google Scholar 

  17. Podilchuk, C., Zeng, W.: Image adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications 16(4), 525–540 (1998)

    Article  Google Scholar 

  18. Rose, C., Ulukus, S., Yates, R.: Wireless systems and interference avoidance. IEEE Trans. on Wireless Communications 1, 415–428 (2002)

    Article  Google Scholar 

  19. Ulukus, S., Yates, R.D.: Iterative signature adaptation for capacity maximization of cdma systems. In: Proceedings of the 36th Allerton Conference on Communications, Control and Computing, Monticello, IL (September 1998)

    Google Scholar 

  20. Sarwate, D.: Meeting the welch bound with equality. In: Ding, C., Helleseth, T., Niederreiter, H. (eds.) Sequences and Their Applications: Proceedings of SETA 1998. DMTCS Series. Springer, Heidelberg (1999)

    Google Scholar 

  21. Stone, H.S.: Analysis of attacks on image watermarks with randomized coefficients. Tech. Rep. 96-045, NEC Research Institute (1996)

    Google Scholar 

  22. Su, J., Eggers, J., Girod, B.: Capacity of digital watermarks subjected to an optimal collusion attack. In: European Signal Processing Conference, EUSIPCO 2000 (2000)

    Google Scholar 

  23. Swanson, M., Kobayashi, M., Tewfik, A.H.: Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE 87, 1064–1087 (1998)

    Article  Google Scholar 

  24. Tang, L.: Methods for encrypting and decrypting MPEG video efficiently. In: Proceedings of the 4th ACM Inter. Conf. on Multimedia, November 1996, pp. 219–229 (1996)

    Google Scholar 

  25. Trappe, W., Song, J., Poovendran, R., Liu, K.: Key distribution for secure multimedia multicasts via data embedding. In: IEEE Int. Conference on Acoustics, Speech, and Signal Processing (2001)

    Google Scholar 

  26. Trappe, W., Song, J., Poovendran, R., Liu, K.: A dynamic key distribution scheme using data embedding for secure multimedia multicast. IEEE Trans. on Multimedia 5, 544–557 (2003)

    Article  Google Scholar 

  27. Trappe, W., Wu, M., Wang, Z., Liu, K.: Anti-collusion fingerprinting for multimedia. IEEE Trans. on Signal Processing, 1069–1087 (April 2003)

    Google Scholar 

  28. Vikalo, H., Hassibi, B.: On sphere decoding algorithm. ii. generalizations, second-order statistics, and applications to communications. IEEE Transactions on Signal Processing 53, 2819–2834 (2005)

    Article  MathSciNet  Google Scholar 

  29. Viswanath, P., Anantharam, V., Tse, D.: Optimal sequences, power control, and user capacity of synchronous cdma systems with linear mmse multiuser receivers. IEEE Trans. on Information Theory 45, 1968–1983 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  30. Wang, Z., Wu, M., Trappe, W., Liu, K.: Group-oriented fingerprinting for multimedia forensics. EURASIP Journal on Applied Signal Processing, Special Issue on Multimedia Security and Rights Management, 2153–2173 (2004)

    Google Scholar 

  31. Wang, Z., Wu, M., Zhao, H., Trappe, W., Liu, K.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans. on Image Proc. 14, 804–821 (2005)

    Article  Google Scholar 

  32. Welch, L.R.: Lower bounds on the maximum cross correlation of signals. IEEE Trans. on Information Theory 20, 397–399 (1974)

    Article  MATH  MathSciNet  Google Scholar 

  33. Wen, J., Muttrell, M., Severa, M.: Access control of standard video bitstreams. In: Proceedings of the Inter. Conf. on Media Future (May 2001)

    Google Scholar 

  34. Wu, M., Liu, B.: Multimedia Data Hiding. Springer, Heidelberg (2002)

    Google Scholar 

  35. Zhao, H., Wu, M., Wang, Z., Liu, K.: Nonlinear collusion attacks on independent multimedia fingerprints. IEEE Trans. on Image Proc. (May 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Li, Z., Trappe, W. (2010). WBE-Based Anti-collusion Fingerprints: Design and Detection. In: Sencar, H.T., Velastin, S., Nikolaidis, N., Lian, S. (eds) Intelligent Multimedia Analysis for Security Applications. Studies in Computational Intelligence, vol 282. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11756-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11756-5_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11754-1

  • Online ISBN: 978-3-642-11756-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics