ABSTRACT
Digital fingerprinting is a technique for tracing the distribution of multimedia content, and protecting it from unauthorized manipulation. Unique identification information is embedded into each distributed copy of the signal. In a collusion attack, fingerprints are combined to remove or distort the fingerprints. Audio signals are good candidates for fingerprinting, because of the forgiving nature of the human auditory system to cross-talk between channels. We use principal components of the audio signal to construct an abstract vector space. The fingerprints are ordered rotations in that space. The rotations are determined by arrays with good correlation properties. These arrays are embedded in real audio, and are imperceptible, according to a panel of experts. These fingerprints are resistant to an averaging collusion attack by hundreds or thousands of colluders, and can withstand a worst case RandNeg attack by up to 30 colluders.
- Boneh D., Shaw J. 1998. Collusion-secure fingerprinting for digital data, IEEE Trans. on Information Theory, 44 (5), 1897--1905.Google ScholarDigital Library
- Celik M.U., Sharma G., and Tekalp A.M. 2004. Collusion-resilient fingerprinting by random pre-warping. IEEE Signal Processing Letters, 11(10), 831--835.Google ScholarCross Ref
- FooteJ., Adcock J., and Girgensohn A. 2003. Time base modulation: A new approach to watermarking audio, IEEE International Conference on Multimedia and Expo, v1, 221--224. Google ScholarDigital Library
- Frank R.L. and Zadoff S.A. 1962. Phase Shift Pulse Codes with Good Periodic Correlation Properties, IRE Transactions on Information Theory, vol. 8, no. 6, 381--382.Google ScholarCross Ref
- Hafter E.R., Dye Jr. R.H., Wenzel E. 1983. Detection of interaural differences of intensity in trains of high frequency clicks as a function of interclick interval and number, J. Acoustical Soc. of America 73, 1708--1713.Google ScholarCross Ref
- http://en.wikipedia.org/wiki/Intel High Definition AudioGoogle Scholar
- http://www.bizcommunity.com/Article/196/19/12363.htmlGoogle Scholar
- Kirovski D. 2005. Collusion of Fingerprints via the Gradient Attack, ISIT, 2280 -- 2284.Google Scholar
- Kirovski D. and Malvar H.S. 2003. Spread-spectrum watermarking of audio signals, IEEE Trans. Signal Processing, 51(4):1020--1033. Google ScholarDigital Library
- LiZ., and Trappe W. 2005. Collusion-resistant fingerprinting from WBE sequence sets. ICC 2005, IEEE International Conference on Communications, 1336 -- 1340.Google Scholar
- Liu K. J. R., Trappe W., Wang Z.J., Wu M, and Zhao H. 2005. Multimedia Fingerprinting Forensics for Traitor Tracing. EURASIP Book Series on Signal Processing and Communications, Volume 4. ISBN 977--5945--18--6Google Scholar
- McAlpine D., Jiang D., Palmer A.R. 2001. A neural code for low-frequency sound localization in mammals, Nature Neuroscience 4, 396 -- 401.Google ScholarCross Ref
- Moreno O., Tirkel A.Z., Parampalli U., and van Schyndel R. 2010. New Families of Arrays in Two Dimensions for Watermarking Applications, Electronics Letters, 28 October Volume 46, Issue 22, p.1500--1502.Google Scholar
- Moreno O., and Tirkel A.Z. 2011. Multi-Dimensional Arrays for Watermarking, ISIT 2011, St. Petersburg, 2667--2671.Google Scholar
- Pantev C., Elbert T., Ross B., Eulitz C., Terhardt E. 1996. Binaural fusion and the representation of virtual pitch in the human auditory cortex, Hearing Research 100, 164--170.Google ScholarCross Ref
- Parker T. 2006. Collusion Resistance in Digital Fingerprinting. School of Mathematical Sciences, Monash University.Google Scholar
- Svalbe I.D., Tirkel A.Z., van Schyndel R. 2000. Discrete Angle Watermark Encoding and Recovery, ICPR International Conference on Pattern Recognition, Barcelona, Spain, vol 4, 246--250. Google ScholarDigital Library
- Tachibana R., Shimizu S., Kobayashi S., Nakamura T. 2002. An audio watermarking method using a two-dimensional pseudo-random array, Signal Processing 82, 1455--1469. Google ScholarDigital Library
- Tirkel A.Z., Osborne C.F., Hall T.E. 1997. Image and watermark registration, Signal Processing, 66, 373--383. Google ScholarDigital Library
- Tirkel A.Z. and Hall T.E. 2006. New Matrices with good Auto and Cross-Correlation. IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, A, No.9, p.2315--2321. Google ScholarDigital Library
- Tirkel A.Z., Rankin G.A., van Schyndel R.M., Ho W.J., Mee N.R.A., and Osborne C.F. 1993. Electronic Water Mark, DICTA 93, Macquarie University, p.666--673.Google Scholar
- Trappe W., Wu M., Wang Z., and Liu K.J.R. 2003. Anti-collusion fingerprinting for multimedia. IEEE Trans. on Signal Processing, 51(4). Google ScholarDigital Library
- van Schyndel R., Tirkel A.Z., Svalbe I. D. 1999. A Multiplicative Color Watermark, IEEE-EURASIP Workshop on Non-Linear Signal and Imaging Processing, Antalya, Turkey 336--340.Google Scholar
- ZhaoH.V., Wu M., Wang Z.J., Liu K.J.R. 2005. Forensic Analysis of Nonlinear Collusion Attacks for Multimedia Fingerprinting, IEEE Trans on Image Processing, v 14, No 5, 646--661. Google ScholarDigital Library
Index Terms
- Collusion resistant fingerprinting of digital audio
Recommendations
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Unique identification information is embedded into each distributed copy of multimedia signal and serves as a ...
Fingerprinting relational databases
SAC '06: Proceedings of the 2006 ACM symposium on Applied computingIn this paper, we propose a fingerprinting solution to protect valuable numeric relational data from illegal duplications and redistributions. We introduce a twice-embedding scheme. In the first embedding process, we embed a unique fingerprint to ...
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
Fingerprinting provides a means of tracing unauthorized redistribution of digital data by individually marking each authorized copy with a personalized serial number. In order to prevent a group of users from collectively escaping identification, ...
Comments