Image Desynchronization for Secure Collusion-Resilient Fingerprint in Compression Domain

  • Zhongxuan Liu
  • Shiguo Lian
  • Zhen Ren
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4261)


Collusion is a major menace to image fingerprint. Recently, an idea is introduced for collusion-resilient fingerprint by desynchronizing images in raw data. In this paper, we consider compression domain image desynchronization method and its system security. First, appropriate desynchronization forms for compression domain are presented; secondly, the system security is discussed and a secure scheme is proposed; thirdly, for evaluating the visual degradation of space desynchronization, we propose a metric called Synchronized Degradation Metric (SDM). Performance analysis including the experiments indicate the effectiveness of the proposed scheme and the metric.


Visual Quality Image Watermark Geometric Distortion Image Fingerprint Collusion Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Wu, M., Trappe, W., Wang, Z.J., Liu, R.: Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine 21(2), 15–27 (2004)CrossRefGoogle Scholar
  2. 2.
    Wang, Z.J., Wu, M., Zhao, H.V., Trappe, W., Liu, K.J.R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans. Image Processing. 14(6), 804–821 (2005)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5), 1897–1905 (1998)MATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Schaathun, H.G.: The Boneh-Shaw fingerprinting scheme is better than we thought. IEEE Trans. Information Forensics and Security 1(2), 248–255 (2006)CrossRefGoogle Scholar
  5. 5.
    Wu, Y.D.: Linear combination collusion attack and its application on an anti-collusion fingerprinting. In: IEEE ICASSP 2005, Philadelphia, USA, vol. II, pp. 13–16 (2005)Google Scholar
  6. 6.
    Mao, Y.N., Mihcak, K.: Collusion-resistant intentional de-synchronization for digital video fingerprinting. In: IEEE ICIP 2005, vol. 1, pp. 237–240 (2005)Google Scholar
  7. 7.
    Celik, M.U., Sharma, G., Tekalp, A.M.: Collusion-resilient fingerprinting by random pre-warping. IEEE Signal Processing Letters 11(10), 831–835 (2004)CrossRefGoogle Scholar
  8. 8.
    Chang, S.F.: Compressed-domain techniques for image/video indexing and manipulation. In: IEEE ICIP 1995, vol. 1, pp. 23–26 (1995)Google Scholar
  9. 9.
    Smith, B.C., Rowe, L.A.: Fast software processing of motion JPEG video. ACM Multimedia, 77–88 (1994)Google Scholar
  10. 10.
    Lee, J.S., Tsai, C.T., Ko, C.H.: Image watermarking through attack simulation. Optical Engineering 45(2) (2006) 027001/1-11Google Scholar
  11. 11.
    Setyawan, I., Lagendijk, R.L.: Perceptual quality impact of geometric distortion in images. In: 25-th Symposium on Information Theory in the Benelux, June 2-4, 2004, pp. 217–224 (2004)Google Scholar
  12. 12.
    Setyawan, I., Lagendijk, R.L.: Human perception of geometric distortions in images. In: SPIE Security, Steganography, and Watermarking of Multimedia Contents 2004, pp. 256–267 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Zhongxuan Liu
    • 1
  • Shiguo Lian
    • 1
  • Zhen Ren
    • 1
  1. 1.France Telecom R & D BeijingBeijingChina

Personalised recommendations