Abstract
In this paper we propose a novel method to achieve video fingerprinting and confidentiality in a broadcasting environment. The fingerprinting technique can be used to generate unique copies for individual subscribers and can be used to identify the copyright violator. Thus for tracing the copyright violator, unique copy per subscriber is needed whereas broadcasting requires a single copy to be transmitted to everyone. The proposed method efficiently incorporates both these requirements. In addition to the fingerprinting requirement to trace the subscriber who is violating the copyright, a confidentiality requirement needs to be implemented against the non-subscribers in the broadcast region. The proposed algorithm efficiently combines both the fingerprinting requirement and confidentiality requirement into one single atomic process. The proposed algorithm uses robust invisible watermarking technique for fingerprinting and masking technique for confidentiality. The additional advantage of the proposed scheme is that it also supports MPEG-2 compressed domain processing, which is useful for many broadcasting standards.






Similar content being viewed by others
References
Anderson R, Manifavas C (1997, January) Chameleon—a new kind of stream cipher. Encryption in Haifa
Braudaway GW, Magerlein KA, Mintzer F (1997) Protecting publicly available images with a visible image watermark. Int Conf Image Proc 1:524–527
Briscoe B, Fairman I (1999, June) Nark: receiver based multicast key management and non-repudiation. BT Technical Report
Brown I, Crowcroft J, Perkins C (1999, November) Watercasting: distributed watermarking of multicast media. Networked group communications. Italy, pp 286–300
Boneh D, Shaw J (1998, September) Collusion-secure fingerprinting for digital data. IEEE Trans Inf Theory 44:1897–1905
Buer M, Wallace J (1996, August) Integrated security for digital video broadcast. IEEE Trans Consum Electron 42(3):500–503
Chu HH, Qiao L, Nahrstedt K (1999, January) A secure multicast protocol with copyright protection. Proceedings of SPIE symposium on electronic imaging: science and technology
Clayson PL, Dallard NS (1997, September) Systems issues in the implementation of DVB simulcrypt conditional access. Int Broadcast Conv 470–475
Cox IJ, Killian J, Leighton T, Shamoon T (1997, December) Secured spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Cox IJ, Miller ML, Bloom JA Digital watermarking. Morgan Kaufmann Publishers, Inc., San Francisco, 2001
Craver S, Memon N, Yeo B, Yeung MM (1998, May) Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks and implications. IEEE J Sel Areas Commun 16(4):573–586
Cutts DJ (1997, February) DVB conditional access. Electron Commun Eng J 9(1):21–27
Dittman J, Stabenau M, Steinmetz R (1998) Robust MPEG video watermarking technologies. ACM International Multimedia Conference, pp71–80
Doërr G, Dugelay J-L (2003) A guide tour of video watermarking. Signal Process, Image Commun 18(4):263–282
Emmanuel S, Kankanhalli MS (2001, August) Copyright protection for MPEG-2 compressed broadcast video. Proceedings of the IEEE international conference on multimedia and expo (ICME 2001), Tokyo
Emmanuel S, Kankanhalli MS (2003) A digital rights management scheme for broadcast video. Multimedia Systems Journal 8(6):444–458
Haque MA (1985, December) A two-dimensional fast cosine transform. IEEE Trans Acoust Speech Signal Process 33(6):1532–1539
Hartung F, Girod B (1998, May) Watermarking of uncompressed and compressed video. Signal Process 66(3):283–301
Hartung F, Kutter M (1999, July) Multimedia watermarking techniques. Proc IEEE 87(7):1079–1107
Hartung F, Ramme F (2000, November) Digital rights management and watermarking of multimedia content for M-commerce applications. IEEE Commun Mag 38(11):78–84
Girod B, Hartung F, Su JK (1999, January) Spread spectrum watermarking: malicious attacks and counterattacks. Proceedings of the SPIE, Electronic Imaging 99, San Jose, USA, vol 3657, pp147–158
Haskell BG, Netravali AN, Puri A (1997) Digital video: an introduction to MPEG-2. International Thomson, Chapman & Hall
http://www.atsc.org/standards.html. ATSC Standard A/70: Conditional Access System for Terrestrial Broadcast with Amendment
http://www.chiariglione.org/mpeg/index.htm. The MPEG Home Page. Text of ISO/IEC 13818-1
ISO/IEC 13818-1: Generic coding of moving pictures and associated audio: systems. (MPEG-2 Systems)
ISO/IEC 14496-1: Coding of audiovisual objects: systems. (MPEG-4 Systems)
Ammar M, Judge P (2000, June) WHIM: watermarking multicast video with a hierarchy of intermediaries. NOSSDAV, North Carolina
Kalker T (1999) System issues in digital image and video watermarking for copyright protection. IEEE Int Conf Multimedia Comput Syst 1:562–567
Kankanhalli MS, Rajmohan, Ramakrishnan KR (1999) Adaptive visible watermarking of images. IEEE Int Conf Multimedia Comput Syst 1:568–573
Kundur D, Hatzinakos D (1999, July) Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87(7):1167–1180
Linnartz JP, Depovere G, Kalker T Philips electronics response to call for proposals issued by the data hiding subGroup copy protection technical working group
Macq BM, Quisquater JJ (1995, June) Cryptology for digital TV broadcasting. Proc IEEE 83(6):944–957
Meng J, Chang SF (1998) Embedding visible video watermarks in the compressed domain. Int Conf Image Proc 1:474–477
Mooij W (1997, September) Advances in conditional access technology. Int Broadcast Conv, pp 461–464
Parviainen R, Parnes P (2001, May) Large scale distributed watermarking of multicast media through encryption. Proceedings of the CMS 2001, Germany
Piva A, Barni M, Bartolini F, Cappellini V (1997) DCT-based watermark recovering without resorting to the uncorrupted original image. Int Conf Image Proc 1:520–523
Rao KR, Yip P (1990) Discrete cosine transform algorithms advantages applications. Academic
Strycker LD, Termont P, Vandewege J, Haitsma J, Kalker A, Maes M, Depovere G (2000, August) Implementation of a real-time digital watermarking process for broadcast monitoring on a TriMedia VLIW processor. IEE Proceedings, Visual Image Signal Processing 147(4)
Su K, Kundur D, Hatzinakos D (2004) Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance. IEEE Trans Multimedia
Voyatzis G, Pitas I (1999, July) The use of watermarking in the protection of digital multimedia products. Proc IEEE 87(7)
Wolfgang RB, Delp EJ (1997, June) A watermarking technique for digital imagery: further studies. Proceedings of the international conference on imaging science, systems and applications (CISST 97), Las Vegas, NV, USA, pp279–287
Zeng W, Lei S (1999, November) Efficient frequency domain digital video scrambling for content access control. ACM Multimedia ’99 Proceedings, Orlando, Florida
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Emmanuel, S., Kankanhalli, M.S. Mask-based fingerprinting scheme for digital video broadcasting. Multimed Tools Appl 31, 145–170 (2006). https://doi.org/10.1007/s11042-006-0041-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-006-0041-3