Abstract
In this paper, scene-based fingerprinting method for traitor tracing is proposed which is computationally less complex and handles large user group, say 1011 users while requiring few frames to embed the watermark. The proposed method uses QR code as a watermark due to its three main features: (1) inherent templates, (2) noise resiliency, and (3) compact size. The proposed method creates the QR code watermark on-the-fly which is then segmented and embedded parallely inside the scenes of video using the watermarking key. The features of QR code, segmentation, and watermarking key not only help the proposed method in supporting a large user group but also make it computationally fast. Further, synchronization issues may arise due to addition and deletion of scenes. To avoid such scenarios, the proposed method matches the inherent templates present in QR code with the templates present in the segments of the extracted watermark. Experimental results show that the proposed method is computationally efficient and is robust against attacks such as collusion, scene dropping, scene addition, and other common signal processing attacks.
Similar content being viewed by others
Notes
Security can be further increased by binding \(A_t\) with public and private keys similar to PKI systems. This is out-of-scope of this paper and is not discussed further.
References
Ahmed, N., Natarajan, T., Rao, K.: Discrete cosine transform. IEEE Trans. Comput. C-23(1), 90–93 (1974). doi:10.1109/T-C.1974.223784
Anderson, R., Manifavas, C.: Chameleon: a new kind of stream cipher. In: Biham, E. (ed.) Fast Software Encryption. Lecture Notes in Computer Science, vol. 1267, pp. 107–113. Springer, Berlin (1997)
Bianchi, T., Piva, A.: Secure watermarking for multimedia content protection: a review of its benefits and open issues. IEEE Signal Process. Mag. 30(2), 87–96 (2013)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44(5), 1897–1905 (1998)
Byers, S., Cranor, L.F., Cronin, E., Korman, D., McDaniel, P.: An analysis of security vulnerabilities in the movie production and distribution process. Telecommun. Policy 28(7–8), 619–644 (2004)
Celik, M., Lemma, A., Katzenbeisser, S., van der Veen, M.: Lookup-table-based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. Inf. Forensics Secur. 3(3), 475–487 (2008)
Chan, P.W., Lyu, M., Chin, R.: A novel scheme for hybrid digital video watermarking: approach, evaluation and experimentation. IEEE Trans. Circuits Syst. Video Technol. 15(12), 1638–1649 (2005)
Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)
Cox, I.J., Kilian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)
Darazi, R., Callau, P., Macq, B.: Secure and HVS-adaptive exhibition spread transform dither modulation watermarking for digital cinema. In: First IEEE International Workshop on Information Forensics and Security, 2009 (WIFS 2009), pp. 1–5 (2009)
Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer–seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM Workshop on Multimedia and Security (MM&Sec ’09), pp. 9–18. ACM, New York (2009)
Dittmann, J., Schmitt, P., Saar, E., Ueberberg, J., Schwenk, J.: Combining digital watermarks and collusion secure fingerprints for digital images. J. Electron. Imaging 9(4), 456–467 (2000)
Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283–301 (1998). doi:10.1016/S0165-1684(98)00011-5. http://dx.doi.org/10.1016/S0165-1684(98)00011-5
He, S., Wu, M.: Collusion-resistant video fingerprinting for large user group. IEEE Trans. Inf. Forensics Secur. 2(4), 697–709 (2007). doi:10.1109/TIFS.2007.908179
Huang, H.C., Chang, F.C., Fang, W.C.: Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans. Consum. Electron. 57(2), 779–787 (2011). doi:10.1109/TCE.2011.5955222
Klaue, J., Rathke, B., Wolisz, A.: EvalVid a framework for video transmission and quality evaluation. In: Kemper, P., Sanders, W. (eds.) Computer Performance Evaluation. Modelling Techniques and Tools. Lecture Notes in Computer Science, vol. 2794, pp. 255–272. Springer, Berlin (2003)
Mehta, S., Varadharajan, V., Nallusamy, R.: On-the-fly watermarking of videos for real-time applications. In: 2012 IEEE International Conference on Multimedia and Expo Workshops (ICMEW), pp. 55–60 (2012). doi:10.1109/ICMEW.2012.17
Piva, A., Bianchi, T., De Rosa, A.: Secure client-side ST-DM watermark embedding. IEEE Trans. Inf. Forensics Secur. 5(1), 13–26 (2010)
Shahid, Z., Chaumont, M., Puech, W.: Spread spectrum-based watermarking for Tardos code-based fingerprinting for H.264/AVC video. In: 2010 17th IEEE International Conference on Image Processing (ICIP), pp. 2105–2108 (2010)
Swaminathan, A., He, S., Wu, M.: Exploring QIM-based anti-collusion fingerprinting for multimedia. Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 60721T (2006)
Tardos, G.: Optimal probabilistic fingerprint codes. J. ACM 55(2), 10:1–10:24 (2008)
Tomas-Buliart, J., Fernandez, M., Soriano, M.: Improvement of collusion secure convolutional fingerprinting information codes. In: Desmedt, Y. (ed.) Information Theoretic Security. Lecture Notes in Computer Science, vol. 4883, pp. 76–88. Springer, Berlin (2009)
Trappe, W., Wu, M., Liu, K.: Collusion-resistant fingerprinting for multimedia. In: 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 4, pp. IV-3309–IV-3312 (2002)
Trappe, W., Wu, M., Wang, Z., Liu, K.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 51(4), 1069–1087 (2003)
Vashistha, A., Nallusamy, R., Paul, S.: 2PASCD: an efficient 2-pass abrupt scene change detection algorithm. In: Proceedings of the 2010 International Conference on Multimedia Information Networking and Security (MINES ’10), pp. 44–48. IEEE Computer Society, Washington, DC (2010)
Voyatzis, G., Pitas, I.: Applications of toral automorphisms in image watermarking, vol. 2. In: Proceedings, International Conference on Image Processing, vol. 1, pp. 237–240 (1996)
Zhao, H., Liu, K.: Fingerprint multicast in secure video streaming. IEEE Trans. Image Process. 15(1), 12–29 (2006)
Zhu, Y., Feng, D., Zou, W.: Collusion secure convolutional spread spectrum fingerprinting. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) Digital Watermarking. Lecture Notes in Computer Science, vol. 3710, pp. 67–83. Springer, Berlin (2005)
Acknowledgments
We would like to thank Infosys Lab, Infosys Limited for providing us an opportunity to carry out this work. We would also like to thank the editor and reviewers for their useful comments and suggestions. Balakrishnan Prabhakaran is supported by the National Science Foundation under Grant No. 1012975. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by L. Zhou.
This work was done when S. Mehta and R. Nallusamy were working with Infosys Labs, Infosys Limited, Bangalore 560100, India.
Rights and permissions
About this article
Cite this article
Mehta, S., Nallusamy, R. & Prabhakaran, B. Scene-based fingerprinting method for traitor tracing. Multimedia Systems 22, 197–211 (2016). https://doi.org/10.1007/s00530-014-0442-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-014-0442-5