Robust and Secure Watermarking for Multimedia Traitor Tracing
نویسندگان
چکیده
This thesis focuses on the design of a robust and secure watermarking technique in the contextof multimedia fingerprinting for traitors tracing; and proposes a complete multimediafingerprinting system. Our work builds on a robust zero-bit watermarking technique `BrokenArrows', and we propose two improvements to make it more robust, especially, to prevent A.Westfeld's denoising attack. Its security aspect is also strengthened in view of some knownand published security attacks, such as A. Westfeld's clustering attack and P. Bas's subspaceestimation attack. Furthermore, we extend its security by considering some unpublishedattacks, introducing a novel secure watermarking scheme, which is based on `a contrario'decision test and a maximization embedding method constrained by imperceptibility and bysecurity. Finally, we propose a complete multimedia fingerprinting system, which is based onthe symmetric q-ary Tardos fingerprinting code, and these improved watermarking techniques.As these watermarking techniques are very robust, we can detect multiple fingerprints in oneattacked block; this allows us to propose two extended accusation methods for the Tardoscode. The experimental investigations show the good performance of our design; it can evendeal with the previously poorly managed attacks like the fusion of documents.tel-00592126,version1-11May2011
منابع مشابه
Recent Advances in Multimedia Information System Security
A multimedia communication system enables multimedia data's generation, storage, management, distribution, receiving, consuming, editing, sharing, and so on. In such systems, there are various security issues, which must be considered such as eavesdropping, intrusion, forgery, piracy and privacy, etc. Until now, various security solutions for multimedia communication systems have been reported,...
متن کاملOn the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking
Digital fingerprinting is the technique used for traitor tracing in multimedia content distribution. It embeds unique customer information (e.g., customer ID) into multimedia content and generates different copies for different customers. The unique customer information can be extracted from the illegal copy and used to tell the traitor who re-distributes his copy to other unauthorized customer...
متن کاملFlexible Traitor Tracing for Anonymous Attacks
Copyrighted materials are divided into multiple segments and each segment has multiple variations that are differently watermarked and encrypted. The combination of watermark and encryption enables one to identify the actual users (traitors) who have engaged in the piracy. In this paper, we shall present a traitor tracing scheme that can efficiently and flexibly defend against anonymous attacks.
متن کاملContent adaptive watermarking for multimedia fingerprinting
This paper presents a feasible system for multimedia fingerprinting. One of the important problems of fingerprinting is watermarking strategies for the fingerprints, in other words, where to embed and how to embed. We address these two major problems of fingerprint-watermarking for multimedia in the proposed content-adaptive watermarking scheme. First, the fingerprint codes are often very long ...
متن کاملTraitor tracing scheme with constant ciphertext rate against powerful pirates
Traitor tracing schemes are used to fight piracy when distributing securely some data to multiple authorized receivers: if some receivers collude and share their decryption keys to build some pirate decoder, a tracing procedure should be able to find at least one of these “traitors” from the pirate decoder. In this paper, we consider powerful pirate decoders, which may sometimes refuse to decry...
متن کامل