Neural networks: algorithms, applications, and programming techniques
Neural networks: algorithms, applications, and programming techniques
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On Some Methods for Unconditionally Secure Key Distributionand Broadcast Encryption
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
SIAM Journal on Discrete Mathematics
Content based watermarking of images
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
Some New Results on Key Distribution Patterns and BroadcastEncryption
Designs, Codes and Cryptography
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Soft-Decision Tracing in Fingerprinted Multimedia Content
IEEE MultiMedia
Group-oriented fingerprinting for multimedia forensics
EURASIP Journal on Applied Signal Processing
Anti-collusion fingerprinting for multimedia
IEEE Transactions on Signal Processing
An additive approach to transform-domain information hiding andoptimum detection structure
IEEE Transactions on Multimedia
Combinatorial properties of frameproof and traceability codes
IEEE Transactions on Information Theory
Applications of list decoding to tracing traitors
IEEE Transactions on Information Theory
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
Multiresolution scene-based video watermarking using perceptual models
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Hidden digital watermarks in images
IEEE Transactions on Image Processing
Hi-index | 0.00 |
This paper presents a feasible system for multimedia fingerprinting. One of the important problems of fingerprinting is watermarking strategies for the fingerprints, in other words, where to embed and how to embed. We address these two major problems of fingerprint-watermarking for multimedia in the proposed content-adaptive watermarking scheme. First, the fingerprint codes are often very long if the applicable resisting ability to colluders and large customer bases are needed. As a result, the acute degradation of fingerprinted content may be unacceptable. We design a strength-decision algorithm, on the basis of neural networks, to adaptively embed the long-length fingerprints with suitable magnitudes to different image regions. This adaptive watermarking technique maintains the equilibrium of the robustness and the imperceptibility without the effort to deal with visual models. Second, we analyze the disturbance of collusion attacks on images and propose an optimization algorithm which can select better embedding positions to resist collusion attacks and preserve acceptable transparency of the watermark according to different multimedia contents. In addition, we consider the lossy property of multimedia watermarking and use a sequential detection strategy to identify colluders, which can tolerate erasures and errors possibly induced in the watermarking process or communication channel. Experimental results show the high detection correctness of traitor tracing. It implies that our fingerprinting system, constructed by applying c-TA code to the content-adaptive watermarking scheme and a sequential detection algorithm, is effective for multimedia application. One can replace the fingerprint codes in our system with other existing codes to obtain effective fingerprinting systems with higher tracing correctness and practical parameters (reasonable collusion-resilience and applicable size of customer bases).