TY - JOUR
T1 - Content adaptive watermarking for multimedia fingerprinting
AU - Lin, Yu Tzu
AU - Wu, Ja Ling
N1 - Funding Information:
This work was partially supported by the National Science Council and the Ministry of Education of ROC under the contract no. NSC92-2622-E-002-002, NSC92-2213-E-002-023, 89E-FA06-2-4-8 and NSC93-2752-E-002-006-PAE. We would also like to acknowledge Dr. Chun-Hsiang Huang for his helpful discussions and valuable suggestions.
PY - 2008/7
Y1 - 2008/7
N2 - This paper presents a feasible system for multimedia fingerprinting. One of the important problems of fingerprinting is watermarking strategies for the fingerprints, in other words, where to embed and how to embed. We address these two major problems of fingerprint-watermarking for multimedia in the proposed content-adaptive watermarking scheme. First, the fingerprint codes are often very long if the applicable resisting ability to colluders and large customer bases are needed. As a result, the acute degradation of fingerprinted content may be unacceptable. We design a strength-decision algorithm, on the basis of neural networks, to adaptively embed the long-length fingerprints with suitable magnitudes to different image regions. This adaptive watermarking technique maintains the equilibrium of the robustness and the imperceptibility without the effort to deal with visual models. Second, we analyze the disturbance of collusion attacks on images and propose an optimization algorithm which can select better embedding positions to resist collusion attacks and preserve acceptable transparency of the watermark according to different multimedia contents. In addition, we consider the lossy property of multimedia watermarking and use a sequential detection strategy to identify colluders, which can tolerate erasures and errors possibly induced in the watermarking process or communication channel. Experimental results show the high detection correctness of traitor tracing. It implies that our fingerprinting system, constructed by applying c-TA code to the content-adaptive watermarking scheme and a sequential detection algorithm, is effective for multimedia application. One can replace the fingerprint codes in our system with other existing codes to obtain effective fingerprinting systems with higher tracing correctness and practical parameters (reasonable collusion-resilience and applicable size of customer bases).
AB - This paper presents a feasible system for multimedia fingerprinting. One of the important problems of fingerprinting is watermarking strategies for the fingerprints, in other words, where to embed and how to embed. We address these two major problems of fingerprint-watermarking for multimedia in the proposed content-adaptive watermarking scheme. First, the fingerprint codes are often very long if the applicable resisting ability to colluders and large customer bases are needed. As a result, the acute degradation of fingerprinted content may be unacceptable. We design a strength-decision algorithm, on the basis of neural networks, to adaptively embed the long-length fingerprints with suitable magnitudes to different image regions. This adaptive watermarking technique maintains the equilibrium of the robustness and the imperceptibility without the effort to deal with visual models. Second, we analyze the disturbance of collusion attacks on images and propose an optimization algorithm which can select better embedding positions to resist collusion attacks and preserve acceptable transparency of the watermark according to different multimedia contents. In addition, we consider the lossy property of multimedia watermarking and use a sequential detection strategy to identify colluders, which can tolerate erasures and errors possibly induced in the watermarking process or communication channel. Experimental results show the high detection correctness of traitor tracing. It implies that our fingerprinting system, constructed by applying c-TA code to the content-adaptive watermarking scheme and a sequential detection algorithm, is effective for multimedia application. One can replace the fingerprint codes in our system with other existing codes to obtain effective fingerprinting systems with higher tracing correctness and practical parameters (reasonable collusion-resilience and applicable size of customer bases).
KW - Collusion-resistance
KW - Fingerprinting
KW - Traitor tracing
KW - Watermarking
UR - http://www.scopus.com/inward/record.url?scp=42949111512&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=42949111512&partnerID=8YFLogxK
U2 - 10.1016/j.csi.2007.08.012
DO - 10.1016/j.csi.2007.08.012
M3 - Article
AN - SCOPUS:42949111512
SN - 0920-5489
VL - 30
SP - 271
EP - 287
JO - Computer Standards and Interfaces
JF - Computer Standards and Interfaces
IS - 5
ER -