TTP-Free Asymmetric Fingerprinting Based on Client Side Embedding

被引:23
作者
Bianchi, Tiziano [1 ]
Piva, Alessandro [2 ]
机构
[1] Politecn Torino, Dept Elect & Telecommun, I-10129 Turin, Italy
[2] Univ Florence, Dept Informat Engn, I-50121 Florence, Italy
关键词
Fingerprinting; buyer-seller watermarking (BSW) protocol; client-side embedding; secure watermark embedding; WATERMARKING; PROTOCOL; CODES;
D O I
10.1109/TIFS.2014.2340581
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose a solution for implementing an asymmetric fingerprinting protocol within a client-side embedding distribution framework. The scheme is based on two novel client-side embedding techniques that are able to reliably transmit a binary fingerprint. The first one relies on standard spread-spectrum like client-side embedding, while the second one is based on an innovative client-side informed embedding technique. The proposed techniques enable secure distribution of personalized decryption keys containing the Buyer's fingerprint by means of existing asymmetric protocols, without using a trusted third party. Simulation results show that the fingerprint can be reliably recovered by using either nonblind decoding with standard embedding or blind decoding with informed embedding, and in both cases it is robust with respect to common attacks. To the best of our knowledge, the proposed scheme is the first solution addressing asymmetric fingerprinting within a client-side framework, representing a valid solution to both customer's rights and scalability issues in multimedia content distribution.
引用
收藏
页码:1557 / 1568
页数:12
相关论文
共 38 条
[1]   Closest point search in lattices [J].
Agrell, E ;
Eriksson, T ;
Vardy, A ;
Zeger, K .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (08) :2201-2214
[2]  
Anderson R, 1997, LECT NOTES COMPUT SC, V1267, P107
[3]  
Barni M., 2004, Watermarking Systems Engineering: Enabling Digital AssetsSecurity and other Applications
[4]  
Bianchi Tiziano, 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), P3987, DOI 10.1109/ICASSP.2014.6854350
[5]   Secure Watermarking for Multimedia Content Protection [J].
Bianchi, Tiziano ;
Piva, Alessandro .
IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) :87-96
[6]   Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals [J].
Bianchi, Tiziano ;
Piva, Alessandro ;
Barni, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) :180-187
[7]   On the Implementation of the Discrete Fourier Transform in the Encrypted Domain [J].
Bianchi, Tiziano ;
Piva, Alessandro ;
Barni, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) :86-97
[8]   Collusion-secure fingerprinting for digital data [J].
Boneh, D ;
Shaw, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :1897-1905
[9]   Lookup-table-based secure client-side embedding for spread-spectrum watermarks [J].
Celik, Mehmet Utku ;
Lemma, Aweke N. ;
Katzenbeisser, Stefan ;
van der Veen, Michiel .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) :475-487
[10]  
Celik MU, 2007, INT CONF ACOUST SPEE, P153