Skip to main content
Log in

Mask-based fingerprinting scheme for digital video broadcasting

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper we propose a novel method to achieve video fingerprinting and confidentiality in a broadcasting environment. The fingerprinting technique can be used to generate unique copies for individual subscribers and can be used to identify the copyright violator. Thus for tracing the copyright violator, unique copy per subscriber is needed whereas broadcasting requires a single copy to be transmitted to everyone. The proposed method efficiently incorporates both these requirements. In addition to the fingerprinting requirement to trace the subscriber who is violating the copyright, a confidentiality requirement needs to be implemented against the non-subscribers in the broadcast region. The proposed algorithm efficiently combines both the fingerprinting requirement and confidentiality requirement into one single atomic process. The proposed algorithm uses robust invisible watermarking technique for fingerprinting and masking technique for confidentiality. The additional advantage of the proposed scheme is that it also supports MPEG-2 compressed domain processing, which is useful for many broadcasting standards.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Anderson R, Manifavas C (1997, January) Chameleon—a new kind of stream cipher. Encryption in Haifa

  2. Braudaway GW, Magerlein KA, Mintzer F (1997) Protecting publicly available images with a visible image watermark. Int Conf Image Proc 1:524–527

    Google Scholar 

  3. Briscoe B, Fairman I (1999, June) Nark: receiver based multicast key management and non-repudiation. BT Technical Report

  4. Brown I, Crowcroft J, Perkins C (1999, November) Watercasting: distributed watermarking of multicast media. Networked group communications. Italy, pp 286–300

  5. Boneh D, Shaw J (1998, September) Collusion-secure fingerprinting for digital data. IEEE Trans Inf Theory 44:1897–1905

    Article  MATH  MathSciNet  Google Scholar 

  6. Buer M, Wallace J (1996, August) Integrated security for digital video broadcast. IEEE Trans Consum Electron 42(3):500–503

    Article  Google Scholar 

  7. Chu HH, Qiao L, Nahrstedt K (1999, January) A secure multicast protocol with copyright protection. Proceedings of SPIE symposium on electronic imaging: science and technology

  8. Clayson PL, Dallard NS (1997, September) Systems issues in the implementation of DVB simulcrypt conditional access. Int Broadcast Conv 470–475

  9. Cox IJ, Killian J, Leighton T, Shamoon T (1997, December) Secured spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  10. Cox IJ, Miller ML, Bloom JA Digital watermarking. Morgan Kaufmann Publishers, Inc., San Francisco, 2001

  11. Craver S, Memon N, Yeo B, Yeung MM (1998, May) Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks and implications. IEEE J Sel Areas Commun 16(4):573–586

    Article  Google Scholar 

  12. Cutts DJ (1997, February) DVB conditional access. Electron Commun Eng J 9(1):21–27

    Article  Google Scholar 

  13. Dittman J, Stabenau M, Steinmetz R (1998) Robust MPEG video watermarking technologies. ACM International Multimedia Conference, pp71–80

  14. Doërr G, Dugelay J-L (2003) A guide tour of video watermarking. Signal Process, Image Commun 18(4):263–282

    Article  Google Scholar 

  15. Emmanuel S, Kankanhalli MS (2001, August) Copyright protection for MPEG-2 compressed broadcast video. Proceedings of the IEEE international conference on multimedia and expo (ICME 2001), Tokyo

  16. Emmanuel S, Kankanhalli MS (2003) A digital rights management scheme for broadcast video. Multimedia Systems Journal 8(6):444–458

    Article  Google Scholar 

  17. Haque MA (1985, December) A two-dimensional fast cosine transform. IEEE Trans Acoust Speech Signal Process 33(6):1532–1539

    Article  MATH  Google Scholar 

  18. Hartung F, Girod B (1998, May) Watermarking of uncompressed and compressed video. Signal Process 66(3):283–301

    Article  MATH  Google Scholar 

  19. Hartung F, Kutter M (1999, July) Multimedia watermarking techniques. Proc IEEE 87(7):1079–1107

    Article  Google Scholar 

  20. Hartung F, Ramme F (2000, November) Digital rights management and watermarking of multimedia content for M-commerce applications. IEEE Commun Mag 38(11):78–84

    Article  Google Scholar 

  21. Girod B, Hartung F, Su JK (1999, January) Spread spectrum watermarking: malicious attacks and counterattacks. Proceedings of the SPIE, Electronic Imaging 99, San Jose, USA, vol 3657, pp147–158

  22. Haskell BG, Netravali AN, Puri A (1997) Digital video: an introduction to MPEG-2. International Thomson, Chapman & Hall

  23. http://www.atsc.org/standards.html. ATSC Standard A/70: Conditional Access System for Terrestrial Broadcast with Amendment

  24. http://www.chiariglione.org/mpeg/index.htm. The MPEG Home Page. Text of ISO/IEC 13818-1

  25. ISO/IEC 13818-1: Generic coding of moving pictures and associated audio: systems. (MPEG-2 Systems)

  26. ISO/IEC 14496-1: Coding of audiovisual objects: systems. (MPEG-4 Systems)

  27. Ammar M, Judge P (2000, June) WHIM: watermarking multicast video with a hierarchy of intermediaries. NOSSDAV, North Carolina

  28. Kalker T (1999) System issues in digital image and video watermarking for copyright protection. IEEE Int Conf Multimedia Comput Syst 1:562–567

    Google Scholar 

  29. Kankanhalli MS, Rajmohan, Ramakrishnan KR (1999) Adaptive visible watermarking of images. IEEE Int Conf Multimedia Comput Syst 1:568–573

    Google Scholar 

  30. Kundur D, Hatzinakos D (1999, July) Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87(7):1167–1180

    Article  Google Scholar 

  31. Linnartz JP, Depovere G, Kalker T Philips electronics response to call for proposals issued by the data hiding subGroup copy protection technical working group

  32. Macq BM, Quisquater JJ (1995, June) Cryptology for digital TV broadcasting. Proc IEEE 83(6):944–957

    Article  Google Scholar 

  33. Meng J, Chang SF (1998) Embedding visible video watermarks in the compressed domain. Int Conf Image Proc 1:474–477

    Google Scholar 

  34. Mooij W (1997, September) Advances in conditional access technology. Int Broadcast Conv, pp 461–464

  35. Parviainen R, Parnes P (2001, May) Large scale distributed watermarking of multicast media through encryption. Proceedings of the CMS 2001, Germany

  36. Piva A, Barni M, Bartolini F, Cappellini V (1997) DCT-based watermark recovering without resorting to the uncorrupted original image. Int Conf Image Proc 1:520–523

    Google Scholar 

  37. Rao KR, Yip P (1990) Discrete cosine transform algorithms advantages applications. Academic

  38. Strycker LD, Termont P, Vandewege J, Haitsma J, Kalker A, Maes M, Depovere G (2000, August) Implementation of a real-time digital watermarking process for broadcast monitoring on a TriMedia VLIW processor. IEE Proceedings, Visual Image Signal Processing 147(4)

  39. Su K, Kundur D, Hatzinakos D (2004) Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance. IEEE Trans Multimedia

  40. Voyatzis G, Pitas I (1999, July) The use of watermarking in the protection of digital multimedia products. Proc IEEE 87(7)

  41. Wolfgang RB, Delp EJ (1997, June) A watermarking technique for digital imagery: further studies. Proceedings of the international conference on imaging science, systems and applications (CISST 97), Las Vegas, NV, USA, pp279–287

  42. Zeng W, Lei S (1999, November) Efficient frequency domain digital video scrambling for content access control. ACM Multimedia ’99 Proceedings, Orlando, Florida

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sabu Emmanuel.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Emmanuel, S., Kankanhalli, M.S. Mask-based fingerprinting scheme for digital video broadcasting. Multimed Tools Appl 31, 145–170 (2006). https://doi.org/10.1007/s11042-006-0041-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-006-0041-3

Keywords