Robust and Secure Watermarking for Multimedia Traitor Tracing

نویسندگان

  • Fuchun XIE
  • Patrick BAS
  • Andreas WESTFELD
  • Atilla BASKURT
  • Caroline FONTAINE
  • Teddy FURON
  • Fuchun Xie
  • Meiling LUO
چکیده

This thesis focuses on the design of a robust and secure watermarking technique in the contextof multimedia fingerprinting for traitors tracing; and proposes a complete multimediafingerprinting system. Our work builds on a robust zero-bit watermarking technique `BrokenArrows', and we propose two improvements to make it more robust, especially, to prevent A.Westfeld's denoising attack. Its security aspect is also strengthened in view of some knownand published security attacks, such as A. Westfeld's clustering attack and P. Bas's subspaceestimation attack. Furthermore, we extend its security by considering some unpublishedattacks, introducing a novel secure watermarking scheme, which is based on `a contrario'decision test and a maximization embedding method constrained by imperceptibility and bysecurity. Finally, we propose a complete multimedia fingerprinting system, which is based onthe symmetric q-ary Tardos fingerprinting code, and these improved watermarking techniques.As these watermarking techniques are very robust, we can detect multiple fingerprints in oneattacked block; this allows us to propose two extended accusation methods for the Tardoscode. The experimental investigations show the good performance of our design; it can evendeal with the previously poorly managed attacks like the fusion of documents.tel-00592126,version1-11May2011

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recent Advances in Multimedia Information System Security

A multimedia communication system enables multimedia data's generation, storage, management, distribution, receiving, consuming, editing, sharing, and so on. In such systems, there are various security issues, which must be considered such as eavesdropping, intrusion, forgery, piracy and privacy, etc. Until now, various security solutions for multimedia communication systems have been reported,...

متن کامل

On the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking

Digital fingerprinting is the technique used for traitor tracing in multimedia content distribution. It embeds unique customer information (e.g., customer ID) into multimedia content and generates different copies for different customers. The unique customer information can be extracted from the illegal copy and used to tell the traitor who re-distributes his copy to other unauthorized customer...

متن کامل

Flexible Traitor Tracing for Anonymous Attacks

Copyrighted materials are divided into multiple segments and each segment has multiple variations that are differently watermarked and encrypted. The combination of watermark and encryption enables one to identify the actual users (traitors) who have engaged in the piracy. In this paper, we shall present a traitor tracing scheme that can efficiently and flexibly defend against anonymous attacks.

متن کامل

Content adaptive watermarking for multimedia fingerprinting

This paper presents a feasible system for multimedia fingerprinting. One of the important problems of fingerprinting is watermarking strategies for the fingerprints, in other words, where to embed and how to embed. We address these two major problems of fingerprint-watermarking for multimedia in the proposed content-adaptive watermarking scheme. First, the fingerprint codes are often very long ...

متن کامل

Traitor tracing scheme with constant ciphertext rate against powerful pirates

Traitor tracing schemes are used to fight piracy when distributing securely some data to multiple authorized receivers: if some receivers collude and share their decryption keys to build some pirate decoder, a tracing procedure should be able to find at least one of these “traitors” from the pirate decoder. In this paper, we consider powerful pirate decoders, which may sometimes refuse to decry...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011