Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia

被引:12
作者
Czaplewski, Bartosz [1 ]
Rykaczewski, Roman [1 ]
机构
[1] Gdansk Univ Technol, Fac Elect Telecommun & Informat, Dept Teleinformat Networks, PL-80233 Gdansk, Poland
关键词
Fingerprinting; Multimedia distribution; Joint fingerprinting and decryption; Collusion attack; Traitor tracing; WATERMARKING ALGORITHM; ENCRYPTION; SCHEME; IMAGES;
D O I
10.1016/j.sigpro.2014.12.026
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix multiplication to encrypt images which are then sent to all users via multicast transmission. Individual decryption keys are designed depending on the users' fingerprints so that a different fingerprint will be introduced into the image during decryption for each unique decryption key. Encryption and fingerprinting are performed on DCT coefficients, which results in high robustness against compression, low-pass filtering, scaling, etc. The experimental results show that the proposed method is robust against collusion attacks and compression. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:150 / 164
页数:15
相关论文
共 40 条
  • [1] Adelsbach A, 2006, LECT NOTES COMPUT SC, V4058, P136
  • [2] Anderson R, 1997, LECT NOTES COMPUT SC, V1267, P107
  • [3] A general framework for robust watermarking security
    Barni, M
    Bartolini, F
    Furon, T
    [J]. SIGNAL PROCESSING, 2003, 83 (10) : 2069 - 2084
  • [4] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
  • [5] A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
    Cancellaro, M.
    Battisti, F.
    Carli, M.
    Boato, G.
    De Natale, F. G. B.
    Neri, A.
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (01) : 1 - 12
  • [6] CANCELLARO M, 2008, P SPIE, V6819
  • [7] Lookup-table-based secure client-side embedding for spread-spectrum watermarks
    Celik, Mehmet Utku
    Lemma, Aweke N.
    Katzenbeisser, Stefan
    van der Veen, Michiel
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) : 475 - 487
  • [8] Partial encryption of compressed images and videos
    Cheng, H
    Li, XB
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2000, 48 (08) : 2439 - 2451
  • [9] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [10] Czaplewski B., 2011, GDANSK U TECHNOLOGY, V1, P237