Scene-based fingerprinting method for traitor tracing
- 211 Downloads
In this paper, scene-based fingerprinting method for traitor tracing is proposed which is computationally less complex and handles large user group, say 1011 users while requiring few frames to embed the watermark. The proposed method uses QR code as a watermark due to its three main features: (1) inherent templates, (2) noise resiliency, and (3) compact size. The proposed method creates the QR code watermark on-the-fly which is then segmented and embedded parallely inside the scenes of video using the watermarking key. The features of QR code, segmentation, and watermarking key not only help the proposed method in supporting a large user group but also make it computationally fast. Further, synchronization issues may arise due to addition and deletion of scenes. To avoid such scenarios, the proposed method matches the inherent templates present in QR code with the templates present in the segments of the extracted watermark. Experimental results show that the proposed method is computationally efficient and is robust against attacks such as collusion, scene dropping, scene addition, and other common signal processing attacks.
KeywordsTraitor tracing Watermarking Fingerprinting QR code
We would like to thank Infosys Lab, Infosys Limited for providing us an opportunity to carry out this work. We would also like to thank the editor and reviewers for their useful comments and suggestions. Balakrishnan Prabhakaran is supported by the National Science Foundation under Grant No. 1012975. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
- 1.Ahmed, N., Natarajan, T., Rao, K.: Discrete cosine transform. IEEE Trans. Comput. C-23(1), 90–93 (1974). doi: 10.1109/T-C.1974.223784
- 10.Darazi, R., Callau, P., Macq, B.: Secure and HVS-adaptive exhibition spread transform dither modulation watermarking for digital cinema. In: First IEEE International Workshop on Information Forensics and Security, 2009 (WIFS 2009), pp. 1–5 (2009)Google Scholar
- 11.Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer–seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM Workshop on Multimedia and Security (MM&Sec ’09), pp. 9–18. ACM, New York (2009)Google Scholar
- 16.Klaue, J., Rathke, B., Wolisz, A.: EvalVid a framework for video transmission and quality evaluation. In: Kemper, P., Sanders, W. (eds.) Computer Performance Evaluation. Modelling Techniques and Tools. Lecture Notes in Computer Science, vol. 2794, pp. 255–272. Springer, Berlin (2003)CrossRefGoogle Scholar
- 17.Mehta, S., Varadharajan, V., Nallusamy, R.: On-the-fly watermarking of videos for real-time applications. In: 2012 IEEE International Conference on Multimedia and Expo Workshops (ICMEW), pp. 55–60 (2012). doi: 10.1109/ICMEW.2012.17
- 19.Shahid, Z., Chaumont, M., Puech, W.: Spread spectrum-based watermarking for Tardos code-based fingerprinting for H.264/AVC video. In: 2010 17th IEEE International Conference on Image Processing (ICIP), pp. 2105–2108 (2010)Google Scholar
- 20.Swaminathan, A., He, S., Wu, M.: Exploring QIM-based anti-collusion fingerprinting for multimedia. Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 60721T (2006)Google Scholar
- 21.Tardos, G.: Optimal probabilistic fingerprint codes. J. ACM 55(2), 10:1–10:24 (2008)Google Scholar
- 23.Trappe, W., Wu, M., Liu, K.: Collusion-resistant fingerprinting for multimedia. In: 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 4, pp. IV-3309–IV-3312 (2002)Google Scholar
- 25.Vashistha, A., Nallusamy, R., Paul, S.: 2PASCD: an efficient 2-pass abrupt scene change detection algorithm. In: Proceedings of the 2010 International Conference on Multimedia Information Networking and Security (MINES ’10), pp. 44–48. IEEE Computer Society, Washington, DC (2010)Google Scholar
- 26.Voyatzis, G., Pitas, I.: Applications of toral automorphisms in image watermarking, vol. 2. In: Proceedings, International Conference on Image Processing, vol. 1, pp. 237–240 (1996)Google Scholar