An Enhanced Hierarchical Traitor Tracing Scheme Based on Clustering Algorithms

  • Faten ChaabaneEmail author
  • Maha Charfeddine
  • Chokri Ben Amar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10334)


The easiness of using and manipulating digital media content has a volte face. In fact, although average users can simply be familiar with some manipulations such as a simple duplication, these manipulations can be dangerous with dishonest users whose target is illegal. Manipulating and duplicating digital media content via the Internet and Peer to Peer networks is available even to average users but can be used to unauthorized purposes with dishonest customers. Henceforth, facing the loss caused by unauthorized treatments and protecting the digital content become challenging to the media industry and research has led to different mechanisms of digital content protection. The aim of the multimedia distribution platforms, even Video on demand platforms, is to propose a suitable structure to the embedded fingerprints to ensure an efficient and fast tracing process in multimedia distribution platforms involving great number of users. The Tardos code has been the most popular tracing code due to its efficient tracing detection performance. One main challenge of the existing Tardos-based tracing approaches was to face the decoding complexity and the computational costs of the tracing process.

Hence, the tracing scheme we propose to improve in this paper was proposed previously as a group-based scheme which enables to construct groups of users according to a multi-level hierarchy. Based on clustering algorithm, we propose to construct groups of users’ fingerprints, and then to apply the tracing process. The main target is to show how deep is the impact of using a clustering algorithms in the hierarchical tracing scheme.


Tracing Traitors Tardos Clustering Hierarchical 


  1. 1.
    Akashi, N., Kuribayashi, M., Morii, M.: Hierarchical construction of Tardos code. In: International Symposium on Information Theory and Its Applications 2008, ISITA 2008, pp. 1–6 (2008)Google Scholar
  2. 2.
    Boneh, D., Kiayias, A., Montgomery, H.W.: Robust fingerprinting codes: a near optimal construction. In: Proceedings of the 10th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, 4 October 2010, pp. 3–12 (2010)Google Scholar
  3. 3.
    Chaabane, F., Charfeddine, M., Amar, C.B.: A multimedia tracing traitors scheme using multi-level hierarchical structure for Tardos fingerprint based audio watermarking. In: SIGMAP 2014 - Proceedings of the 11th International Conference on Signal Processing and Multimedia Applications, Vienna, Austria, 28–30 August 2014, pp. 289–296 (2014)Google Scholar
  4. 4.
    Chaabane, F., Charfeddine, M., Amar, C.B.: Clustering impact on group-based traitor tracing schemes. In: 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakesh, Morocco, 14–16 December 2015, pp. 440–445 (2015)Google Scholar
  5. 5.
    Chaabane, F., Charfeddine, M., Amar, C.B.: Novel two-level tracing scheme using clustering algorithm. J. Inf. Assur. Secur. 11(4), 179–189 (2016). 11pGoogle Scholar
  6. 6.
    Chaabane, F., Charfeddine, M., Puech, W., Amar, C.B.: A two-stage traitor tracing strategy for hierarchical fingerprints. Multimedia Tools Appl. (2016)Google Scholar
  7. 7.
    Charfeddine, M., Elarbi, M., Koubaa, M., Amar, C.B.: DCT based blind audio watermarking scheme. In: SIGMAP, pp. 139–144 (2010)Google Scholar
  8. 8.
    Choi, J., Reaz, A.S., Mukherjee, B.: A survey of user behavior in VOD service and bandwidth-saving multicast streaming schemes. IEEE Commun. Surv. Tutorials 14(1), 156–169 (2012)CrossRefGoogle Scholar
  9. 9.
    Elarbi, M., Charfeddine, M., Masmoudi, S., Amar, M.: Video watermarking algorithm with BCH error correcting codes hidden in audio channel. In: IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France 11–15 April 2011, pp. 164–170 (2011)Google Scholar
  10. 10.
    El’arbi, M., Koubaa, M., Charfeddine, M., Amar, C.B.: A dynamic video watermarking algorithm in fast motion areas in the wavelet domain. Multimedia Tools Appl. 55(3), 579–600 (2011)CrossRefGoogle Scholar
  11. 11.
    Furon, T., Pérez-Freire, L.: Worst case attacks against binary probabilistic traitor tracing codes. CoRR abs/0903.3480 (2009)Google Scholar
  12. 12.
    Hamida, A.B., Koubàa, M., Nicolas, H.: Hierarchical traceability of multimedia documents. In: Computational Intelligence in Cyber Security, pp. 108–113 (2011)Google Scholar
  13. 13.
    He, S., Wu, M.: Collusion-resistant video fingerprinting for large user group. IEEE Trans. Inf. Forensics Secur. 2(4), 697–709 (2007)CrossRefGoogle Scholar
  14. 14.
    Laarhoven, T., de Weger, B.: Optimal symmetric Tardos traitor tracing schemes. CoRR abs/1107.3441 (2011)Google Scholar
  15. 15.
    Liu, K.: Multimedia Fingerprinting Forensics for Traitor Tracing. EURASIP Book Series on Signal Processing and Communications. Hindawi Publishing Corporation, Cairo (2005)CrossRefGoogle Scholar
  16. 16.
    Liu, N., Cui, H., Chan, S.H.G., Chen, Z., Zhuang, Y.: Dissecting user behaviors for a simultaneous live and VOD IPTV system. TOMCCAP 10(3), 23 (2014)CrossRefGoogle Scholar
  17. 17.
    Mejdoub, M., Fonteles, L.H., Amar, C.B., Antonini, M.: Fast indexing method for image retrieval using tree-structured lattices. In: International Workshop on Content-Based Multimedia Indexing, CBMI 2008, London, UK, 18–20 June 2008, pp. 365–372 (2008)Google Scholar
  18. 18.
    Peikert, C., shelat, A., Smith, A.: Lower bounds for collusion-secure fingerprinting. In: Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 472–479 (2003)Google Scholar
  19. 19.
    Tardos, G.: Optimal probabilistic fingerprint codes. In: STOC, pp. 116–125 (2003)Google Scholar
  20. 20.
    Wali, A., Ben Aoun, N., Karray, H., Ben Amar, C., Alimi, A.M.: A new system for event detection from video surveillance sequences. In: Blanc-Talon, J., Bone, D., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2010. LNCS, vol. 6475, pp. 110–120. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-17691-3_11 CrossRefGoogle Scholar
  21. 21.
    Wang, Z.J., Wu, M., Zhao, H., Liu, K.J.R., Trappe, W.: Resistance of orthogonal Gaussian fingerprints to collusion attacks. In: 2003 International Conference on Multimedia and Expo, 2003, ICME 2003. Proceedings, vol. 1, pp. I-617–I-620, July 2003Google Scholar
  22. 22.
    Wang, Z.J., Wu, M., Trappe, W., Liu, K.J.R.: Group-oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process. 2004(14), 2153–2173 (2004)CrossRefGoogle Scholar
  23. 23.
    Ye, C., Ling, H., Zou, F., Lu, Z.: A new fingerprinting scheme using social network analysis for majority attack. Telecommun. Syst. 54(3), 315–331 (2013)CrossRefGoogle Scholar
  24. 24.
    Yong, Z., Aixin, Z., Songnian, L.: DCT fingerprint classifier based group fingerprint. In: 2014 International Conference on Audio, Language and Image Processing (ICALIP), pp. 292–295, July 2014Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Faten Chaabane
    • 1
    Email author
  • Maha Charfeddine
    • 1
  • Chokri Ben Amar
    • 1
  1. 1.REGIM-Lab.: REsearch Groups in Intelligent MachinesENIS, University of SfaxSfaxTunisia

Personalised recommendations