Private and Blind Digital Fingerprinting Schemes Based upon Complete Complementary Codes

被引:0
作者
Kojima, Tetsuya [1 ]
Ohtani, Naoki [2 ]
机构
[1] Tokyo Natl Coll Technol, Dept Comp Sci, Hachioji, Tokyo 1930997, Japan
[2] NHK Media Technol Inc, Tokyo 1500047, Japan
来源
2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012) | 2012年
基金
日本学术振兴会;
关键词
WATERMARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Complete complementary code is a family of the spread spectrum sequences with good correlation properties. In this study, the properties of the private and the blind digital fingerprinting schemes using complete complementary codes were evaluated. It is revealed that the proposed scheme is sufficiently robust against collusion attacks by employing a large embedding coefficient in the private case. In addition, in the blind case where the source image cannot be referred to, it was shown that the robustness against collusion attacks could be improved by applying a method called QIM (quantization index modulation) and employing a set of appropriate parameters.
引用
收藏
页码:806 / 810
页数:5
相关论文
共 12 条
  • [1] Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    Chen, B
    Wornell, GW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) : 1423 - 1443
  • [2] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [3] Hayashi N, 2007, LECT NOTES COMPUT SC, V4752, P28
  • [4] Horii Y, 2009, INT WORK SIG DES, P126, DOI 10.1109/IWSDA.2009.5346410
  • [5] Kojima T., 2011, Proceedings of the 2011 Australian Communications Theory Workshop (AusCTW), P1, DOI 10.1109/AUSCTW.2011.5728728
  • [6] Kojima T., 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2010), P498, DOI 10.1109/IIHMSP.2010.127
  • [7] Properties of a Convoluted-Time and Code Division Multiple Access Communication Systems Based upon Complete Complementary Codes
    Kojima, Tetsuya
    Aono, Masahiro
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10): : 2881 - 2884
  • [8] Comparison of the two signal design methods in the CDMA systems using complete complementary codes
    Kojima, Tetsuya
    Fujiwara, Akiko
    Yano, Kenji
    Suehiro, Naoki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (09): : 2299 - 2306
  • [9] Interference Removal Operation for Spread Spectrum Fingerprinting Scheme
    Kuribayashi, Minoru
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 403 - 417
  • [10] Mayazumi R., 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, P45, DOI 10.1109/IIHMSP.2011.70