Skip to main content

Advertisement

Log in

Genetic fingerprinting for copyright protection of multicast media

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Generally speaking, comparing to the unicast or broadcast methods, it is more efficient to transmit multimedia data via the multicast method to massive users. However, the ease of delivery of multimedia data may cause the copyright of such multimedia to be easily infringed upon, and the fingerprinting scheme is one of effective means for conquering this problem. Fingerprint embedding process often generates the multimedia contents into many different versions, which have to be transmitted via the unicast method. In this paper, we propose a new genetic fingerprinting scheme for copyright protection of multicast video. In this method, the encryption and decryption keys, which aim at scrambling and descrambling multimedia contents, are first produced with genetic algorithms. Next, multimedia data are then encrypted and multicast to all users. At the same time, a secure channel is employed to unicast a designated decryption key to each user. When a user deploys the designated key to decrypt the received data, a corresponding fingerprint would be embedded into the contents. Once upon the reception of the fingerprinted multimedia content, the embedded fingerprint can be extracted shortly, and the copyright can be confirmed and assured. Experimental results demonstrate that the proposed method can transmit multimedia data to clients effectively and cause only a slight degradation in perceptual quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Bloom JA (2003) Security and rights management in digital cinema. In: 2003 International conference on multimedia and expo, pp 621–624

  • Boneh D, Shaw J (1998) Collusion-secure fingerprinting for digital data. IEEE Trans Inf Theory 44: 1897–1905

    Article  MATH  MathSciNet  Google Scholar 

  • Chang F-C, Huang H-C, Hang H-M (2007) Layered access control schemes on watermarked scalable media. J VLSI Signal Process Syst Signal Image Video Technol 49: 443–455

    Article  Google Scholar 

  • Chu HH, Qiao L, Nahrstedt K (2002) A secure multicast protocol with copyright protection. ACM Comput Commun Rev 32: 42–60

    Article  Google Scholar 

  • Chuang JC-I, Sirbu MA (2001) Pricing multicast communication: a cost-based approach. Telecommun Syst 17: 281–297

    Article  MATH  Google Scholar 

  • Cox IJ, Miller ML, Bloom JA (2001) Digital watermarking: principles & practice. Morgan Kaufman, Los Altos

    Google Scholar 

  • Gen M, Cheng R (1997) Genetic algorithms and engineering design. Wiley, New York

    Google Scholar 

  • Goldberg DE (1989) Genetic algorithms in search, optimization, and machine learning. Addison-Wesley, Reading

    MATH  Google Scholar 

  • Hartung F, Girod B (1997) Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain. In: 1997 IEEE international conference on acoustics, speech, and signal processing, pp 2621–2624

  • Holland JH (1992) Adaptation in natural and artificial systems. The MIT Press, Cambridge

    Google Scholar 

  • Huang H-C, Pan JS, Huang YH, Wang FH, Huang K-C (2007) Progressive watermarking techniques using genetic algorithms. Circuits Syst Signal Process 26: 671–687

    Article  MATH  Google Scholar 

  • Judge P, Ammar M (2002) WHIM: watermarking multicast video with a hierarchy of intermediaries. Comput Netw 39: 699–712

    Article  Google Scholar 

  • Kunder D, Karthik K (2004) Video fingerprinting and encryption principles for digital rights management. Proc IEEE 92: 918–932

    Article  Google Scholar 

  • Luh W, Kundur D (2004) Digital media fingerprinting: techniques and trends, Chap. 19, Multimedia Security Handbook. CRC, Boca Raton

    Google Scholar 

  • Macq BM, Quisquater J-J (1995) Cryptology for digital TV broadcasting. Proc IEEE 83: 944–957

    Article  Google Scholar 

  • Pan, JS, Huang, H-C, Jain, LC (eds) (2004) Intelligent watermarking techniques. World Scientific Publishing Company, Singapore

    MATH  Google Scholar 

  • Pan JS, Hsin YC, Huang H-C, Huang KC (2004) Robust image watermarking based on multiple description vector quantisation. Electron Lett 40: 1409–1410

    Article  Google Scholar 

  • Pan JS, Sung MT, Huang H-C, Liao BY (2004) Robust VQ-based digital watermarking for the memoryless binary symmetric channel. IEICE Trans Fund Electron Commun Comput Sci E-87: 1839–1841

    Google Scholar 

  • Pan, JS, Huang, H-C, Jain, LC, Fang, WC (eds) (2007) Intelligent multimedia data hiding. Springer, Berlin

    Google Scholar 

  • Parviainen R, Parnes P (2001) Large scale distributed watermarking of multicast media through encryption. In: IFIP conference proceedings on communications and multimedia security, pp 149–158

  • Shieh CS, Huang H-C, Wang FH, Pan JS (2004) Genetic watermarking based on transform domain techniques. Pattern Recognit 37: 555–565

    Article  Google Scholar 

  • Thanos D (2001) COiN-Video: a model for the dissemination of copyrighted video streams over open networks. In: 4th International workshop on information hiding, pp 169–184

  • Wu T-L, Wu SF (1997) Selective encryption and watermarking of MPEG video. In: International conference on image science, systems and technology, pp 261–269

  • Zhao H, Liu KJR (2004) Bandwidth efficient fingerprint multicast for video streaming. In: 2004 IEEE international conference on acoustics, speech, and signal processing, pp 849–852

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hsiang-Cheh Huang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Huang, HC., Chen, YH. Genetic fingerprinting for copyright protection of multicast media. Soft Comput 13, 383–391 (2009). https://doi.org/10.1007/s00500-008-0326-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-008-0326-8

Keywords

Navigation