Skip to main content
Log in

Scene-based fingerprinting method for traitor tracing

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

In this paper, scene-based fingerprinting method for traitor tracing is proposed which is computationally less complex and handles large user group, say 1011 users while requiring few frames to embed the watermark. The proposed method uses QR code as a watermark due to its three main features: (1) inherent templates, (2) noise resiliency, and (3) compact size. The proposed method creates the QR code watermark on-the-fly which is then segmented and embedded parallely inside the scenes of video using the watermarking key. The features of QR code, segmentation, and watermarking key not only help the proposed method in supporting a large user group but also make it computationally fast. Further, synchronization issues may arise due to addition and deletion of scenes. To avoid such scenarios, the proposed method matches the inherent templates present in QR code with the templates present in the segments of the extracted watermark. Experimental results show that the proposed method is computationally efficient and is robust against attacks such as collusion, scene dropping, scene addition, and other common signal processing attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Notes

  1. Security can be further increased by binding \(A_t\) with public and private keys similar to PKI systems. This is out-of-scope of this paper and is not discussed further.

References

  1. Ahmed, N., Natarajan, T., Rao, K.: Discrete cosine transform. IEEE Trans. Comput. C-23(1), 90–93 (1974). doi:10.1109/T-C.1974.223784

  2. Anderson, R., Manifavas, C.: Chameleon: a new kind of stream cipher. In: Biham, E. (ed.) Fast Software Encryption. Lecture Notes in Computer Science, vol. 1267, pp. 107–113. Springer, Berlin (1997)

    Chapter  Google Scholar 

  3. Bianchi, T., Piva, A.: Secure watermarking for multimedia content protection: a review of its benefits and open issues. IEEE Signal Process. Mag. 30(2), 87–96 (2013)

    Article  Google Scholar 

  4. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44(5), 1897–1905 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  5. Byers, S., Cranor, L.F., Cronin, E., Korman, D., McDaniel, P.: An analysis of security vulnerabilities in the movie production and distribution process. Telecommun. Policy 28(7–8), 619–644 (2004)

    Article  Google Scholar 

  6. Celik, M., Lemma, A., Katzenbeisser, S., van der Veen, M.: Lookup-table-based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. Inf. Forensics Secur. 3(3), 475–487 (2008)

    Article  Google Scholar 

  7. Chan, P.W., Lyu, M., Chin, R.: A novel scheme for hybrid digital video watermarking: approach, evaluation and experimentation. IEEE Trans. Circuits Syst. Video Technol. 15(12), 1638–1649 (2005)

    Article  Google Scholar 

  8. Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  9. Cox, I.J., Kilian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  10. Darazi, R., Callau, P., Macq, B.: Secure and HVS-adaptive exhibition spread transform dither modulation watermarking for digital cinema. In: First IEEE International Workshop on Information Forensics and Security, 2009 (WIFS 2009), pp. 1–5 (2009)

  11. Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer–seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM Workshop on Multimedia and Security (MM&Sec ’09), pp. 9–18. ACM, New York (2009)

  12. Dittmann, J., Schmitt, P., Saar, E., Ueberberg, J., Schwenk, J.: Combining digital watermarks and collusion secure fingerprints for digital images. J. Electron. Imaging 9(4), 456–467 (2000)

    Article  Google Scholar 

  13. Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283–301 (1998). doi:10.1016/S0165-1684(98)00011-5. http://dx.doi.org/10.1016/S0165-1684(98)00011-5

  14. He, S., Wu, M.: Collusion-resistant video fingerprinting for large user group. IEEE Trans. Inf. Forensics Secur. 2(4), 697–709 (2007). doi:10.1109/TIFS.2007.908179

    Article  Google Scholar 

  15. Huang, H.C., Chang, F.C., Fang, W.C.: Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans. Consum. Electron. 57(2), 779–787 (2011). doi:10.1109/TCE.2011.5955222

    Article  Google Scholar 

  16. Klaue, J., Rathke, B., Wolisz, A.: EvalVid a framework for video transmission and quality evaluation. In: Kemper, P., Sanders, W. (eds.) Computer Performance Evaluation. Modelling Techniques and Tools. Lecture Notes in Computer Science, vol. 2794, pp. 255–272. Springer, Berlin (2003)

    Chapter  Google Scholar 

  17. Mehta, S., Varadharajan, V., Nallusamy, R.: On-the-fly watermarking of videos for real-time applications. In: 2012 IEEE International Conference on Multimedia and Expo Workshops (ICMEW), pp. 55–60 (2012). doi:10.1109/ICMEW.2012.17

  18. Piva, A., Bianchi, T., De Rosa, A.: Secure client-side ST-DM watermark embedding. IEEE Trans. Inf. Forensics Secur. 5(1), 13–26 (2010)

    Article  Google Scholar 

  19. Shahid, Z., Chaumont, M., Puech, W.: Spread spectrum-based watermarking for Tardos code-based fingerprinting for H.264/AVC video. In: 2010 17th IEEE International Conference on Image Processing (ICIP), pp. 2105–2108 (2010)

  20. Swaminathan, A., He, S., Wu, M.: Exploring QIM-based anti-collusion fingerprinting for multimedia. Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 60721T (2006)

  21. Tardos, G.: Optimal probabilistic fingerprint codes. J. ACM 55(2), 10:1–10:24 (2008)

  22. Tomas-Buliart, J., Fernandez, M., Soriano, M.: Improvement of collusion secure convolutional fingerprinting information codes. In: Desmedt, Y. (ed.) Information Theoretic Security. Lecture Notes in Computer Science, vol. 4883, pp. 76–88. Springer, Berlin (2009)

    Chapter  Google Scholar 

  23. Trappe, W., Wu, M., Liu, K.: Collusion-resistant fingerprinting for multimedia. In: 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 4, pp. IV-3309–IV-3312 (2002)

  24. Trappe, W., Wu, M., Wang, Z., Liu, K.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 51(4), 1069–1087 (2003)

    Article  MathSciNet  Google Scholar 

  25. Vashistha, A., Nallusamy, R., Paul, S.: 2PASCD: an efficient 2-pass abrupt scene change detection algorithm. In: Proceedings of the 2010 International Conference on Multimedia Information Networking and Security (MINES ’10), pp. 44–48. IEEE Computer Society, Washington, DC (2010)

  26. Voyatzis, G., Pitas, I.: Applications of toral automorphisms in image watermarking, vol. 2. In: Proceedings, International Conference on Image Processing, vol. 1, pp. 237–240 (1996)

  27. Zhao, H., Liu, K.: Fingerprint multicast in secure video streaming. IEEE Trans. Image Process. 15(1), 12–29 (2006)

    Article  Google Scholar 

  28. Zhu, Y., Feng, D., Zou, W.: Collusion secure convolutional spread spectrum fingerprinting. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) Digital Watermarking. Lecture Notes in Computer Science, vol. 3710, pp. 67–83. Springer, Berlin (2005)

    Chapter  Google Scholar 

Download references

Acknowledgments

We would like to thank Infosys Lab, Infosys Limited for providing us an opportunity to carry out this work. We would also like to thank the editor and reviewers for their useful comments and suggestions. Balakrishnan Prabhakaran is supported by the National Science Foundation under Grant No. 1012975. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sachin Mehta.

Additional information

Communicated by L. Zhou.

This work was done when S. Mehta and R. Nallusamy were working with Infosys Labs, Infosys Limited, Bangalore 560100, India.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mehta, S., Nallusamy, R. & Prabhakaran, B. Scene-based fingerprinting method for traitor tracing. Multimedia Systems 22, 197–211 (2016). https://doi.org/10.1007/s00530-014-0442-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-014-0442-5

Keywords

Navigation