Browse > Article
http://dx.doi.org/10.3745/KIPSTD.2008.15-D.5.713

Scalable Fingerprinting Scheme based on Angular Decoding for LCCA Resilience  

Seol, Jae-Min (한국전자통신연구원)
Kim, Seong-Whan (서울시립대학교 컴퓨터과학부)
Abstract
Fingerprinting scheme uses digital watermarks to trace originator of unauthorized or pirated copies, however, multiple users may collude and escape identification by creating an average or median of their individually watermarked copies. Previous research works are based on ACC (anti-collusion code) for identifying each user, however, ACC are shown to be resilient to average and median attacks, but not to LCCA and cannot support large number of users. In this paper, we propose a practical SACC (scalable anti-collusion code) scheme and its angular decoding strategy to support a large number of users from basic ACC (anti-collusion code) with LCCA (linear combination collusion attack) robustness. To make a scalable ACC, we designed a scalable extension of ACC codebook using a Gaussian distributed random variable, and embedded the resulting fingerprint using human visual system based watermarking scheme. We experimented with standard test images for colluder identification performance, and our scheme shows good performance over average and median attacks. Our angular decoding strategy shows performance gain over previous decoding scheme on LCCA colluder set identification among large population.
Keywords
Digital Fingerprinting; Anti-Collusion Code; Angular Decoding; BIBD;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Zhao, H., Wu, M., Wang, J., Ray Liu, K. J.: “Nonlinear collusion attacks on independent Fingerprints for multimedia” ICASSP. Vol.5, pp.664-667 Apr., 2003
2 Trappe, W., Wu, M., Wangm Z. J., Liu, K. J. R., “Anticollusion fingerprinting for multimedia,” IEEE Trans. Signal Proc. Vol.51, pp.1069-1087, Apr., 2003   DOI   ScienceOn
3 Kundur D., Karthik K., “Video Fingerprintng and Encryption Principles for Digital Rights Management,” IEEE Proc. Vol.92 pp.918-932, Jun., 2004   DOI   ScienceOn
4 Hassibi B and Vikalo H., “On the Sphere Decoding Algorithm I. Expected Complexity,” IEEE trans. on signal processing Vol.53, pp.2806-2818, Aug., 2005   DOI   ScienceOn
5 Li. Z. and Trappe, W., “Collusion-Resistant Fingerprinting from WBE sequence Sets” IEEE Conf. on communications, Vol.2, pp.1336-1340, May, 2005   DOI
6 Seol. J. M., Kim S. W., “Scalable Fingerprinting Scheme Using Statistically Secure Anti-Collusion Code for Large Scale Contents Distribution,” Lecture Note on Computer Science, Vol.4906, pp560-569, Oct., 2006   DOI   ScienceOn
7 Kim, S.W., Suthaharan, S., Lee, H.K., Rao, K.R., “An image watermarking scheme using visual model and BN distribution,” IEE Elect. Letter, Vol.35 (3), Feb., 1999   DOI   ScienceOn
8 Walpole R. E., Myers R. H. and Myers S. L., “Probability and Statistics for Engineers and Scientists,” 6th ed, Prentice Hall, 1998
9 Yacobi, Y., “Improved Boneh-Shaw content fingerprinting,” Proc. CTRSA2001, pp.378–91, 2001   DOI   ScienceOn
10 Wu. Y., “Linear Combination Collusion Attacks and its Application on an Anti-Collusion Fingerprinting,” IEEE Conf on ICASSP. Vol.51, pp.1069-1087, Apr., 2005
11 Boneh, D., Shaw, J., “Collusion-secure fingerprinting for digital data,” IEEE Trans. Inform. Theory, Vol.44, pp.1897-1905, Sept., 1998   DOI   ScienceOn
12 Colbourn, C. J., Dinitz, J. H., “The CRC Handbook of Combinatorial Design,” Boca Raton, FL: CRC Press 1996
13 Voloshynovskiy, S., Herrige, A., Baumgaertner, N., Pun, T., “A stochastic approach to content adaptive digital image watermarking”. Lecture Notes in Computer Science, Vol.1768, pp.211-236, Sept., 1999   DOI   ScienceOn