skip to main content
10.1145/2756601.2756612acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Flicker Forensics for Pirate Device Identification

Published:17 June 2015Publication History

ABSTRACT

Cryptography-based content protection is an efficient means to protect multimedia content during transport. Nevertheless, content is eventually decrypted at rendering time, leaving it vulnerable to piracy e.g. using a camcorder to record movies displayed on an LCD screen. Such type of piracy naturally imprints a visible flicker signal in the pirate video due to the interplay between the rendering and acquisition devices. The parameters of such flicker are inherently tied to the characteristics of the pirate devices such as the back-light of the LCD screen and the read-out time of the camcorder. In this article, we introduce a forensic methodology to estimate such parameters by analyzing the flicker signal present in pirate recordings. Experimental results clearly showcase that the accuracy of these estimation techniques offers efficient means to tell-tale which devices have been used for piracy thanks to the variety of factory settings used by consumer electronics manufacturers.

References

  1. S. Baudry, B. Chupeau, M. de Vito, and G. Doërr. Modeling the flicker effect in camcorded videos to improve watermark robustness. In Proceedings of the IEEE Workshop on Information Forensics and Security, pages --, December 2014.Google ScholarGoogle Scholar
  2. N. Chang, I. Choi, and H. Shim. DLS: Dynamic backlight luminance scaling of liquid crystal display. IEEE Transactions on Very Large Scale Integration, 12(8):837--846, August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Chupeau, S. Baudry, and G. Doërr. Forensic characterization of pirated movies: Digital cinema cam vs. optical disc rip. In Proceedings of the IEEE Workshop on Information Forensics and Security, pages --, December 2014.Google ScholarGoogle Scholar
  4. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography. Morgan Kaufmann Publishers Inc., 2nd edition, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Digital Cinema Initiatives, LLC. Digital Cinema System Specification, 1.2 edition, March 2008.Google ScholarGoogle Scholar
  6. G. Doërr and J.-L. Dugelay. Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing, 52(10):2955--2964, October 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. T. Furon and G. Doërr. Tracing pirated content on the internet: Unwinding Ariadne's thread. Security & Privacy, 8(5):69--71, September/October 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. E. Gamal and H. Eltoukhy. CMOS image sensors. IEEE Circuits & Devices Magazine, 21(3):6--20, May/June 2005.Google ScholarGoogle ScholarCross RefCross Ref
  9. C.-K. Liang, L.-W. Chang, and H. H. Chen. Analysis and compensation of rolling shutter effect. IEEE Transactions on Image Processing, 17(8):1323--1330, August 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Lukás, J. Fridrich, and M. Goljan. Digital camera identification from sensor noise. IEEE Transactions on Information Security and Forensics, 1(2):205--214, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. J. Moreira-Pérez, B. Chupeau, S. Baudry, and G. Doërr. Exploring color information to characterize camcorder piracy. In Proceedings of the IEEE Workshop on Information Forensics and Security, pages 132--137, November 2013.Google ScholarGoogle ScholarCross RefCross Ref
  12. MovieLabs. MovieLabs specifications for next generation of video and enhanced content protection. Technical report, 2013. http://www.movielabs.com/ngvideo/.Google ScholarGoogle Scholar
  13. D. Poplin. An automatic flicker detection method for embedded camera systems. IEEE Transactions on Consumer Electronics, 52(2):308--311, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. X. Rolland-Nevière, B. Chupeau, G. Doërr, and L. Blondé. Forensic characterization of camcorded movies: Digital cinema vs. celluloid film prints. In Media Watermarking, Security, and Forensics, volume 8303 of Proceedings of SPIE, January 2012.Google ScholarGoogle Scholar
  15. W. Rosenblatt, S. Mooney, and W. Trippe. Digital Rights Management: Business and Technology. John Wiley & Sons, Inc., 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Y. Yoo, J. Im, and J. Paik. Flicker removal for CMOS wide dynamic range imaging based on alternating current component analysis. IEEE Transactions on Consumer Electronics, 60(3):294--301, August 2014.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Flicker Forensics for Pirate Device Identification

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            IH&MMSec '15: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security
            June 2015
            182 pages
            ISBN:9781450335874
            DOI:10.1145/2756601

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 17 June 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            IH&MMSec '15 Paper Acceptance Rate20of45submissions,44%Overall Acceptance Rate128of318submissions,40%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader