Abstract
Securing multimedia content and preventing it from being maliciously manipulated has developed at a rapid pace, and researchers have been studying the traitor tracing as an appropriate solution. This approach consists in retrieving back the actors who contributed to the construction of an illegal release of a multimedia product. It includes two major steps which are the fingerprinting step and the tracing one. The fingerprinting step relies on the watermarking technique whereas the efficiency of the tracing scheme depends on several requirements: the robustness of the watermarking technique, the type of the media content, and even the computational complexity. In this paper, we propose a new collusion-secure fingerprinting scheme for 3D videos. It has essentially a twofold purpose: at a first step, we propose to embed the watermark in the video copy by applying a standard Least Significant Bit (LSB) substitution to all the frames of both the 2D video and the depth map components in order to ensure simultaneously and independently the protection of these two parts. In the second step, we apply the tracing process whose target is the identification of eventual colluders by extracting the hidden identifier from the suspicious video and analyse it. Experimental assessments show that the proposed scheme provides interesting results in terms of speed and tracing accuracy constraints.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
de Rosnay, M.D.: Digital rights management systems and European law: between copyright protection and access control. In: Second International Conference on Web Delivering of Music, 2002. WEDELMUSIC 2002. Proceedings, pp. 117–124 (2002)
Thilagavathi, N., Saravanan, D., Kumarakrishnan, S., Punniakodi, S., Amudhavel, J., Prabu, U.: A survey of reversible watermarking techniques, application and attacks. In: Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015), ICARCSET 2015. Association for Computing Machinery, New York (2015) https://doi.org/10.1145/2743065.2743102
Lee, M., Lee, J., Lee, H.: Perceptual watermarking for 3d stereoscopic video using depth information. In: 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 81–84 (2011)
Kim, H., Lee, J., Oh, T., Lee, H.: Robust DT-CWT watermarking for DIBR 3D images. IEEE Trans. Broadcast. 58(4), 533–543 (2012)
Sheng-Li, F., Mei, Y., Gang-Yi, J., Feng, S., Zong-Ju, P., Sheng-li, F.: A digital watermarking algorithm based on region of interest for 3D image. In: Eighth International Conference on Computational Intelligence and Security 2012, pp. 549–552 (2012)
Lin, Y., Wu, J.: Unseen visible watermarking for color plus depth map 3D images. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1801–1804 (2012)
Liu, X., Zhao, R., Li, F., Liao, S., Ding, Y., Zou, B.: Novel robust zero-watermarking scheme for digital rights management of 3D videos. Signal Process. Image Commun. 54, 140–151 (2017). http://www.sciencedirect.com/science/article/pii/S0923596517300371
Pei, S.-C., Wang, Y.-Y.: A new 3D unseen visible watermarking and its applications to multimedia. In: 2014 IEEE 3rd Global Conference on Consumer Electronics, GCCE 2014, pp. 140–143, February 2015
Gao, G., Jiang, G.: Bessel-fourier moment-based robust image zero-watermarking. Multimedia Tools Appl. 74(3), 841–858 (2015). https://doi.org/10.1007/s11042-013-1701-8
Abdelhedi, K., Chaabane, F., Ben Amar, C.: A SVM-based zero-watermarking technique for 3D videos traitor tracing. In: Blanc-Talon, J., Delmas, P., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2020. LNCS, vol. 12002, pp. 373–383. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-40605-9_32
He, S., Wu, M.: Collusion-resistant video fingerprinting for large user group. IEEE Trans. Inf. Forensics Secur. 2(4), 697–709 (2007)
Tardos, G.: Optimal probabilistic fingerprint codes. J. ACM 55(2) (2008). https://doi.org/10.1145/1346330.1346335
Peikert, C., Shelat, A., Smith, A.: Lower bounds for collusion-secure fingerprinting. In: SODA 2003, pp. 472–479, January 2003
Chaabane, F., Charfeddine, M., Puech, W., Ben Amar, C.: Towards a blind map-based traitor tracing scheme for hierarchical fingerprints. Neural Inf. Process. 11, 505–512 (2015)
Chaabane, F., Charfeddine, M., Puech, W., Ben Amaf, C.: A QR-code based audio watermarking technique for tracing traitors. In: 2015 23rd European Signal Processing Conference (EUSIPCO), pp. 51–55 (2015)
Craver, S., Memon, N., Yeo, B., Yeung, M.M.: Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE J. Sel. Areas Commun. 16(4), 573–586 (1998)
Desoubeaux, M., Guelvouit, G.L., Puech, W.: Fast detection of Tardos codes withboneh-shaw types. In: SPIE 8303, Media Watermarking, Security, and Forensics (2012). http://www.rmit3dv.com
El’arbi, M., Amar, C.B., Nicolas, H.: Video watermarking based on neural networks. In: IEEE International Conference on Multimedia and Expo 2006, pp. 1577–1580 (2006)
Fernandez, M., Soriano, M., Cotrina, J.: Tracing illegal redistribution using errors-anderasures and side information decoding algorithms. Inf. Secur. IET 1, 83–90 (2007)
Furon, T., Pérez-Freire, L.: Worst case attacks against binary probabilistic traitor tracing codes. In: First IEEE International Workshop on Information Forensics and Security (WIFS) 2009, pp. 56–60 (2009)
Chaabane, F., Charfeddine, M., Ben Amar, C.: An enhanced hierarchical traitor tracing scheme based on clustering algorithms, pp. 379–390, June 2017
Hayashi, N., Kuribayashi, M., Morii, M.: Collusion-resistant fingerprinting scheme based on the CDMA-technique. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 28–43. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-75651-4_3
Chaabane, F., Charfeddine, M., Puech, W., Amar, C.B.: A two-stage traitor tracing scheme for hierarchical fingerprints. Multimedia Tools Appl. 76(12), 14 405–14435 (2017). https://doi.org/10.1007/s11042-016-3749-8
Wagner, N.R.: Fingerprinting. In: Proceedings of the 1983 IEEE Symposium on Security and Privacy, Oakland, California, USA, 25–27 April 1983. IEEE Computer Society, 1983, pp. 18–22. https://doi.org/10.1109/SP.1983.10018
Chaabane, F., Charfeddine, M., Ben Amar, C.: A survey on digital tracing traitors schemes. In: 2013 9th International Conference on Information Assurance and Security (IAS), pp. 85–90 (2013)
Sharma, V., Shrivastava, V.: A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection. J. Theor. Appl. Inf. Technol. 36, 1–8 (2012)
Cheng, E., Burton, P., Burton, J., Joseski, A., Burnett, I.: RMIT3DV: pre-announcement of a creative commons uncompressed HD 3D video database. In: 2012 Fourth International Workshop on Quality of Multimedia Experience, pp. 212–217 (2012)
Scharstein, D., Szeliski, R., Zabih, R.: A taxonomy and evaluation of dense two-frame stereo correspondence algorithms. In: Proceedings IEEE Workshop on Stereo and Multi-Baseline Vision (SMBV 2001), pp. 131–140 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Abdelhedi, K., Chaabane, F., Puech, W., Amar, C.B. (2021). Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video. In: Tsapatsoulis, N., Panayides, A., Theocharides, T., Lanitis, A., Pattichis, C., Vento, M. (eds) Computer Analysis of Images and Patterns. CAIP 2021. Lecture Notes in Computer Science(), vol 13052. Springer, Cham. https://doi.org/10.1007/978-3-030-89128-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-89128-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-89127-5
Online ISBN: 978-3-030-89128-2
eBook Packages: Computer ScienceComputer Science (R0)