Abstract
Typical uses of watermarks include copyright protection and disabling unauthorized access to content. Especially, copyright protection watermarks embed some information in the data to identify the copyright holder or content provider, while receiver-identifying watermarking, commonly referred to as fingerprinting, embeds information to identify the receiver of that copy of the content. Thus, if an unauthorized copy of the content is recovered, extracting the fingerprint will show who the initial receiver was [1][2]. In this paper we generalize our previous work [3] of a video fingerprinting system to identify the source of illegal copies. This includes a logo embedding technique, generalization of the distribution system and detailed investigation of the robustness against collusion attacks.
Similar content being viewed by others
References
Judge, P., Ammar, M.: Security Issues and Solutions in Multicast Content Distribution. IEEE Network 17, 30–36 (2003)
Furht, B., Kirovski, B.: Multimedia Security Handbook. CRC Press, Boca Raton (2005)
Kang, H.H., Kurkoski, B., Park, Y.R., Lee, H.J., Shin, S.U., Yamaguchi, K., Kobayashi, K.: Video Fingerprinting System using Wavelet and Error Correcting Code. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, Springer, Heidelberg (2006)
Kang, H.H., Park, Y.R., Park, J.H.: Blind Watermarking based on the Spatial Domain. Conference on Korea Multimedia Society 5(1) (2002)
Stone, H.: Analysis of Attacks on Image Watermarks with Randomized Coefficients. NEC Technical Report (1996)
Wahadaniah, V., Guan, Y.L., Chua, H.C.: A New Collusion Attack and Its Performance Evaluation. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 64–80. Springer, Heidelberg (2003)
Cox, I.J., Kilian, J., Leighton, T., Shanmoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. On Image Processing 6(12), 1673–1687 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kang, H., Kurkoski, B., Park, Y., Shin, S., Yamaguchi, K., Kobayashi, K. (2006). A Viable System for Tracing Illegal Users of Video. In: Chen, H., Wang, FY., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds) Intelligence and Security Informatics. WISI 2006. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734628_20
Download citation
DOI: https://doi.org/10.1007/11734628_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33361-6
Online ISBN: 978-3-540-33362-3
eBook Packages: Computer ScienceComputer Science (R0)