TY - GEN
T1 - Collusion-resistant video fingerprinting based on temporal oscillation
AU - Lin, Yu Tzu
AU - Huang, Chun Hsiang
AU - Wu, Ja Ling
PY - 2008
Y1 - 2008
N2 - Most researches of collusion-resistant multimedia fingerprinting consider only the designing of the traceability code. In this paper, we not only discuss the traceability of the fingerprints, but also try to prevent collusion attacks by making the colluded version of the video useless. The proposed collusion-resistant video fingerprinting scheme embeds a curve fingerprint into the video by temporally oscillating the video frames. This curve is smooth enough so that the oscillation of the video is imperceptible. However, once the colluders average or copy-and-paste the video frames, the fluctuation of the video will be so severe that users will feel uncomfortable while watching the video. In addition, a shot-based fingerprinting is employed to embed a hierarchical traceability code to increase the collusion-resistance. Experimental results show good performances of the proposed scheme. That is, the proposed system not only can trace the colluders successfully, but also can discourage users from removing the traceability code by collusion attacks.
AB - Most researches of collusion-resistant multimedia fingerprinting consider only the designing of the traceability code. In this paper, we not only discuss the traceability of the fingerprints, but also try to prevent collusion attacks by making the colluded version of the video useless. The proposed collusion-resistant video fingerprinting scheme embeds a curve fingerprint into the video by temporally oscillating the video frames. This curve is smooth enough so that the oscillation of the video is imperceptible. However, once the colluders average or copy-and-paste the video frames, the fluctuation of the video will be so severe that users will feel uncomfortable while watching the video. In addition, a shot-based fingerprinting is employed to embed a hierarchical traceability code to increase the collusion-resistance. Experimental results show good performances of the proposed scheme. That is, the proposed system not only can trace the colluders successfully, but also can discourage users from removing the traceability code by collusion attacks.
KW - Collusion-resistance
KW - Fingerprinting
KW - Traitor tracing
UR - http://www.scopus.com/inward/record.url?scp=69949171533&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=69949171533&partnerID=8YFLogxK
U2 - 10.1109/ICIP.2008.4712458
DO - 10.1109/ICIP.2008.4712458
M3 - Conference contribution
AN - SCOPUS:69949171533
SN - 1424417643
SN - 9781424417643
T3 - Proceedings - International Conference on Image Processing, ICIP
SP - 3128
EP - 3131
BT - 2008 IEEE International Conference on Image Processing, ICIP 2008 Proceedings
T2 - 2008 IEEE International Conference on Image Processing, ICIP 2008
Y2 - 12 October 2008 through 15 October 2008
ER -