Desynchronization in Compression Process for Collusion Resilient Video Fingerprint
Till now, few desynchronization methods for video fingerprint have been presented, which are implemented in raw data. In this paper, a compression compliant video desynchronization method for collusion resilient fingerprint is proposed. The technique can simultaneously apply random space/time desynchronization and compression to videos. In our experiments, with little visual degradation, the joint process costs no more time and bandwidth than those of MPEG2 encoding/decoding. By this method, the video quality degrades dramatically for colluded copies. Besides evaluating the method by compression quality, compression time, and visual quality, we also discussed the system security. Two attacks are considered for the security evaluation: re-synchronization attack (including Most Similar Frame Collusion and Random Similar Frame Replacement) and re-desynchronization attack. Schemes for robustness to these attacks are also shown. Two theorems are presented to point out the security limit of single time desynchronization and single space desynchronization and the influence of related parameters to security.
KeywordsMotion Estimation Visual Quality Compression Performance Bandwidth Consumption Collusion Attack
Unable to display preview. Download preview PDF.
- 2.Zhao, H.V., Liu, K.J.R.: Resistance analysis of scalable video fingerprinting systems under fair collusion attacks. In: IEEE ICIP 2005, Genova, Italy, vol. III, pp. 85–88 (2005)Google Scholar
- 3.Wu, Y.D.: Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting. In: IEEE ICASSP, Philadelphia, USA, vol. II, pp. 13–16 (2005)Google Scholar
- 4.Su, J.K., Eggers, J.J., Girod, B.: Capacity of digital watermarks subjected to an optimal collusion attacks. In: European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland (2000)Google Scholar
- 5.Baaziz, N., Sami, Y.: Attacks on Collusion-Secure Fingerprinting for Multicast Video Protocols. In: International Conference of Distributed Frameworks for Multimedia Applications, DFMA 2005, Besançon, France, pp. 210–216 (2005)Google Scholar
- 7.Mao, Y.N., Mihcak, K.: Collusion-Resistant Intentional De-Synchronization for Digital Video Fingerprinting. In: IEEE ICIP 2005, Genova, Italy, vol. I, pp. 237–240 (2005)Google Scholar
- 8.Yu, E., Craver, S.: Fingerprinting with Wow. In: SPIE 18th Annual Symposium of Electronic Imaging, San Jose, California, USA, January 15-19 (2006)Google Scholar
- 9.Li, Z., Trappe, W.: Collusion-resistant fingerprints from WBE sequence sets. In: IEEE International Conference on Communications 2005, Seoul, Korea, vol. II, pp. 1336–1340 (2005)Google Scholar
- 10.Swaminathan, A., He, S., Wu, M.: Exploring QIM based Anti-Collusion Fingerprinting for Multimedia. In: SPIE Conference on Security, Watermarking and Stegonography, San Jose, California, USA, January 15-19 (2006)Google Scholar
- 11.Zhang, J.N., He, Y.W., Yang, S.Q., Zhong, Y.Z.: Performance and complexity joint optimization for H.264 video coding. In: IEEE ISCAS 2003, Bangkok, Thailand, vol. II, pp. 888–891 (2003)Google Scholar
- 12.Zhang, J.N., Sun, L.F., Yang, S.Q., Zhong, Y.Z.: Position Prediction Motion-Compensated Interpolation for Frame Rate Up-Conversion Using Temporal Modeling. In: IEEE ICIP 2005, Genova, Italy, vol. I, pp. 53–56 (2005)Google Scholar
- 17.Delannay, D.: Digital Watermarking Algorithms Robust against Loss of Synchronization. Ph.D. thesis (April 2004)Google Scholar
- 18.Barni, M.: Coping with Random Bending Attack by Means of Exhaustive Search Detection. In: First Wavila Challenge, WACHA 2005, Barcelona, Spain (June 2005)Google Scholar