Desynchronization in Compression Process for Collusion Resilient Video Fingerprint

  • Zhongxuan Liu
  • Shiguo Lian
  • Ronggang Wang
  • Zhen Ren
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4283)


Till now, few desynchronization methods for video fingerprint have been presented, which are implemented in raw data. In this paper, a compression compliant video desynchronization method for collusion resilient fingerprint is proposed. The technique can simultaneously apply random space/time desynchronization and compression to videos. In our experiments, with little visual degradation, the joint process costs no more time and bandwidth than those of MPEG2 encoding/decoding. By this method, the video quality degrades dramatically for colluded copies. Besides evaluating the method by compression quality, compression time, and visual quality, we also discussed the system security. Two attacks are considered for the security evaluation: re-synchronization attack (including Most Similar Frame Collusion and Random Similar Frame Replacement) and re-desynchronization attack. Schemes for robustness to these attacks are also shown. Two theorems are presented to point out the security limit of single time desynchronization and single space desynchronization and the influence of related parameters to security.


Motion Estimation Visual Quality Compression Performance Bandwidth Consumption Collusion Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine 21(2), 15–27 (2004)CrossRefGoogle Scholar
  2. 2.
    Zhao, H.V., Liu, K.J.R.: Resistance analysis of scalable video fingerprinting systems under fair collusion attacks. In: IEEE ICIP 2005, Genova, Italy, vol. III, pp. 85–88 (2005)Google Scholar
  3. 3.
    Wu, Y.D.: Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting. In: IEEE ICASSP, Philadelphia, USA, vol. II, pp. 13–16 (2005)Google Scholar
  4. 4.
    Su, J.K., Eggers, J.J., Girod, B.: Capacity of digital watermarks subjected to an optimal collusion attacks. In: European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland (2000)Google Scholar
  5. 5.
    Baaziz, N., Sami, Y.: Attacks on Collusion-Secure Fingerprinting for Multicast Video Protocols. In: International Conference of Distributed Frameworks for Multimedia Applications, DFMA 2005, Besançon, France, pp. 210–216 (2005)Google Scholar
  6. 6.
    Celik, M.U., Sharma, G., Tekalp, A.M.: Collusion-Resilient Fingerprinting by Random Pre-Warping. IEEE Signal Processing Letters 11(10), 831–835 (2004)CrossRefMATHGoogle Scholar
  7. 7.
    Mao, Y.N., Mihcak, K.: Collusion-Resistant Intentional De-Synchronization for Digital Video Fingerprinting. In: IEEE ICIP 2005, Genova, Italy, vol. I, pp. 237–240 (2005)Google Scholar
  8. 8.
    Yu, E., Craver, S.: Fingerprinting with Wow. In: SPIE 18th Annual Symposium of Electronic Imaging, San Jose, California, USA, January 15-19 (2006)Google Scholar
  9. 9.
    Li, Z., Trappe, W.: Collusion-resistant fingerprints from WBE sequence sets. In: IEEE International Conference on Communications 2005, Seoul, Korea, vol. II, pp. 1336–1340 (2005)Google Scholar
  10. 10.
    Swaminathan, A., He, S., Wu, M.: Exploring QIM based Anti-Collusion Fingerprinting for Multimedia. In: SPIE Conference on Security, Watermarking and Stegonography, San Jose, California, USA, January 15-19 (2006)Google Scholar
  11. 11.
    Zhang, J.N., He, Y.W., Yang, S.Q., Zhong, Y.Z.: Performance and complexity joint optimization for H.264 video coding. In: IEEE ISCAS 2003, Bangkok, Thailand, vol. II, pp. 888–891 (2003)Google Scholar
  12. 12.
    Zhang, J.N., Sun, L.F., Yang, S.Q., Zhong, Y.Z.: Position Prediction Motion-Compensated Interpolation for Frame Rate Up-Conversion Using Temporal Modeling. In: IEEE ICIP 2005, Genova, Italy, vol. I, pp. 53–56 (2005)Google Scholar
  13. 13.
    Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Information Theory 44(5), 1897–1905 (1998)MATHCrossRefMathSciNetGoogle Scholar
  14. 14.
    Lin, E.T., Delp, E.J.: Temporal Synchronization in Video Watermarking. IEEE Trans. Signal Processing 52(10), 3007–3022 (2004)CrossRefGoogle Scholar
  15. 15.
    Cayre, F., Fontaine, C., Furon, T.: Watermarking attack: Security of WSS techniques. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 171–183. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  16. 16.
    Licks, V., Jordan, R.: Geometric Attacks on Image Watermarking Systems. IEEE Multimedia 12(3), 68–78 (2005)CrossRefGoogle Scholar
  17. 17.
    Delannay, D.: Digital Watermarking Algorithms Robust against Loss of Synchronization. Ph.D. thesis (April 2004)Google Scholar
  18. 18.
    Barni, M.: Coping with Random Bending Attack by Means of Exhaustive Search Detection. In: First Wavila Challenge, WACHA 2005, Barcelona, Spain (June 2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Zhongxuan Liu
    • 1
  • Shiguo Lian
    • 1
  • Ronggang Wang
    • 1
  • Zhen Ren
    • 1
  1. 1.France Telecom R & D BeijingBeijingChina

Personalised recommendations