Advertisement

Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems

  • Joan Tomàs-Buliart
  • Marcel Fernandez
  • Miguel Soriano
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4694)

Abstract

Several new video and image watermarking proposals are based on Informed Coding and Informed Embedding. However, these systems can be not easily used in fingerprinting schemes because they do not satisfy the marking assumption defined in [1]. In this paper we discuss some guidelines to adapt a watermarking system based on informed coding and informed embedding to a generic fingerprinting code, while keeping up with the marking assumption, that is to say, when as a result of one collusion attack of two users, that have different marks that represent the value 0 in the nth position, we have a pirate mark wich represents the 0 value in this same nth position. This can be achieved modifying the work of Miller, Doër and Cox in [2].

Keywords

Fingerprinting Informed Coding Informed Embedding 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data (extended abstract). In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)Google Scholar
  2. 2.
    Miller, M.L., Doërr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Transactions on Image Processing 13(6), 792–807 (2004)CrossRefGoogle Scholar
  3. 3.
    Lin, L., Cox, I.J., Doërr, G.J., Miller, M.L.: An efficient algorithm for informed embedding of dirty paper trellis codes for watermarking. In: ICIP 2005, IEEE International Conference on Image Processing, Genova, Italy, September 11-14, 2005, IEEE, Los Alamitos (2005)Google Scholar
  4. 4.
    Miller, M.L., Doërr, G.J., Cox, I.J.: Dirty-paper trellis codes for watermarking. ICIP 2, 129–132 (2002)Google Scholar
  5. 5.
    Miller, M.L., Doërr, G.J., Cox, I.J.: Informed embedding for multi-bit watermarks. In: Digital Watermarking: First International Workshop, IWDW 2002, Seoul, Korea, November 21-22, 2002. Revised Papers, pp. 13–21 (November 2002)Google Scholar
  6. 6.
    Costa, M.H.M.: Writing on dirty paper. IEEE Transactions on Information Theory 29(3), 439 (1983)zbMATHCrossRefGoogle Scholar
  7. 7.
    Cox, I., Miller, M.L., Bloom, J.A.: Digital watermarking. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (2002)Google Scholar
  8. 8.
    Viterbi, A.J., Omura, J.K.: Principles of Digital Communication and Coding. McGraw-Hill, Inc., New York, USA (1979)zbMATHGoogle Scholar
  9. 9.
    David Forney, G.: The viterbi algorithm. Proceedings of The IEEE 61(3), 268–278 (1973)CrossRefGoogle Scholar
  10. 10.
    Ahmed, N., Natarajan, T., Rao, K.R.: Discrete cosine transform. IEEE Trans. Computers, 90–93 (1974)Google Scholar
  11. 11.
    Watson, A.B.: Dct quantization matrices optimized for individual images. In: Proc. SPIE Human Vision, Visual Processing, and Digital Display IV, pp. 202–216 (2005)Google Scholar
  12. 12.
    Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proceedings of the IEEE 87(7), 1079–1107 (1999)CrossRefGoogle Scholar
  13. 13.
    Wu, Y.: Linear combination collusion attack and its application on an anti-collusion fingerprinting. In Acoustics, Speech, and Signal Processing, 2005. In: Proceedings (ICASSP ’05). IEEE International Conference on, vol. 2, pp. 13–16. IEEE, Los Alamitos (2005)Google Scholar
  14. 14.
    Su, J., Eggers, J., Girod, B.: Capacity of digital watermarks subjected to an optimal collusion attack (2000)Google Scholar
  15. 15.
    Ergün, F., Kilian, J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Joan Tomàs-Buliart
    • 1
  • Marcel Fernandez
    • 1
  • Miguel Soriano
    • 1
  1. 1.Department of Telematics Engineering, Universitat Politècnica de Catalunya., C/ Jordi Girona 1 i 3, Mod C3 Campus Nord UPC, 08034 BarcelonaSpain

Personalised recommendations