skip to main content
10.1145/2070425.2070430acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Collusion resistant fingerprinting of digital audio

Published:14 November 2011Publication History

ABSTRACT

Digital fingerprinting is a technique for tracing the distribution of multimedia content, and protecting it from unauthorized manipulation. Unique identification information is embedded into each distributed copy of the signal. In a collusion attack, fingerprints are combined to remove or distort the fingerprints. Audio signals are good candidates for fingerprinting, because of the forgiving nature of the human auditory system to cross-talk between channels. We use principal components of the audio signal to construct an abstract vector space. The fingerprints are ordered rotations in that space. The rotations are determined by arrays with good correlation properties. These arrays are embedded in real audio, and are imperceptible, according to a panel of experts. These fingerprints are resistant to an averaging collusion attack by hundreds or thousands of colluders, and can withstand a worst case RandNeg attack by up to 30 colluders.

References

  1. Boneh D., Shaw J. 1998. Collusion-secure fingerprinting for digital data, IEEE Trans. on Information Theory, 44 (5), 1897--1905.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Celik M.U., Sharma G., and Tekalp A.M. 2004. Collusion-resilient fingerprinting by random pre-warping. IEEE Signal Processing Letters, 11(10), 831--835.Google ScholarGoogle ScholarCross RefCross Ref
  3. FooteJ., Adcock J., and Girgensohn A. 2003. Time base modulation: A new approach to watermarking audio, IEEE International Conference on Multimedia and Expo, v1, 221--224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Frank R.L. and Zadoff S.A. 1962. Phase Shift Pulse Codes with Good Periodic Correlation Properties, IRE Transactions on Information Theory, vol. 8, no. 6, 381--382.Google ScholarGoogle ScholarCross RefCross Ref
  5. Hafter E.R., Dye Jr. R.H., Wenzel E. 1983. Detection of interaural differences of intensity in trains of high frequency clicks as a function of interclick interval and number, J. Acoustical Soc. of America 73, 1708--1713.Google ScholarGoogle ScholarCross RefCross Ref
  6. http://en.wikipedia.org/wiki/Intel High Definition AudioGoogle ScholarGoogle Scholar
  7. http://www.bizcommunity.com/Article/196/19/12363.htmlGoogle ScholarGoogle Scholar
  8. Kirovski D. 2005. Collusion of Fingerprints via the Gradient Attack, ISIT, 2280 -- 2284.Google ScholarGoogle Scholar
  9. Kirovski D. and Malvar H.S. 2003. Spread-spectrum watermarking of audio signals, IEEE Trans. Signal Processing, 51(4):1020--1033. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. LiZ., and Trappe W. 2005. Collusion-resistant fingerprinting from WBE sequence sets. ICC 2005, IEEE International Conference on Communications, 1336 -- 1340.Google ScholarGoogle Scholar
  11. Liu K. J. R., Trappe W., Wang Z.J., Wu M, and Zhao H. 2005. Multimedia Fingerprinting Forensics for Traitor Tracing. EURASIP Book Series on Signal Processing and Communications, Volume 4. ISBN 977--5945--18--6Google ScholarGoogle Scholar
  12. McAlpine D., Jiang D., Palmer A.R. 2001. A neural code for low-frequency sound localization in mammals, Nature Neuroscience 4, 396 -- 401.Google ScholarGoogle ScholarCross RefCross Ref
  13. Moreno O., Tirkel A.Z., Parampalli U., and van Schyndel R. 2010. New Families of Arrays in Two Dimensions for Watermarking Applications, Electronics Letters, 28 October Volume 46, Issue 22, p.1500--1502.Google ScholarGoogle Scholar
  14. Moreno O., and Tirkel A.Z. 2011. Multi-Dimensional Arrays for Watermarking, ISIT 2011, St. Petersburg, 2667--2671.Google ScholarGoogle Scholar
  15. Pantev C., Elbert T., Ross B., Eulitz C., Terhardt E. 1996. Binaural fusion and the representation of virtual pitch in the human auditory cortex, Hearing Research 100, 164--170.Google ScholarGoogle ScholarCross RefCross Ref
  16. Parker T. 2006. Collusion Resistance in Digital Fingerprinting. School of Mathematical Sciences, Monash University.Google ScholarGoogle Scholar
  17. Svalbe I.D., Tirkel A.Z., van Schyndel R. 2000. Discrete Angle Watermark Encoding and Recovery, ICPR International Conference on Pattern Recognition, Barcelona, Spain, vol 4, 246--250. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Tachibana R., Shimizu S., Kobayashi S., Nakamura T. 2002. An audio watermarking method using a two-dimensional pseudo-random array, Signal Processing 82, 1455--1469. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Tirkel A.Z., Osborne C.F., Hall T.E. 1997. Image and watermark registration, Signal Processing, 66, 373--383. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Tirkel A.Z. and Hall T.E. 2006. New Matrices with good Auto and Cross-Correlation. IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, A, No.9, p.2315--2321. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Tirkel A.Z., Rankin G.A., van Schyndel R.M., Ho W.J., Mee N.R.A., and Osborne C.F. 1993. Electronic Water Mark, DICTA 93, Macquarie University, p.666--673.Google ScholarGoogle Scholar
  22. Trappe W., Wu M., Wang Z., and Liu K.J.R. 2003. Anti-collusion fingerprinting for multimedia. IEEE Trans. on Signal Processing, 51(4). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. van Schyndel R., Tirkel A.Z., Svalbe I. D. 1999. A Multiplicative Color Watermark, IEEE-EURASIP Workshop on Non-Linear Signal and Imaging Processing, Antalya, Turkey 336--340.Google ScholarGoogle Scholar
  24. ZhaoH.V., Wu M., Wang Z.J., Liu K.J.R. 2005. Forensic Analysis of Nonlinear Collusion Attacks for Multimedia Fingerprinting, IEEE Trans on Image Processing, v 14, No 5, 646--661. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Collusion resistant fingerprinting of digital audio

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SIN '11: Proceedings of the 4th international conference on Security of information and networks
      November 2011
      276 pages
      ISBN:9781450310208
      DOI:10.1145/2070425

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 November 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate102of289submissions,35%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader