Discrete cosine transform: algorithms, advantages, applications
Discrete cosine transform: algorithms, advantages, applications
Optimal probabilistic fingerprint codes
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
Group-oriented fingerprinting for multimedia forensics
EURASIP Journal on Applied Signal Processing
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Collusion-resistant fingerprinting scheme based on the CDMA-technique
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Collusion secure convolutional spread spectrum fingerprinting
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Anti-collusion fingerprinting for multimedia
IEEE Transactions on Signal Processing
Collusion-secure fingerprinting for digital data
IEEE Transactions on Information Theory
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Improved wavelet-based watermarking through pixel-wise masking
IEEE Transactions on Image Processing
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
IEEE Transactions on Image Processing
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Digital fingerprinting of multimedia data involves embedding information in the content signal and offers the traceability of illegal users who distribute unauthorized copies. One potential threat to fingerprinting system is collusion, whereby a group of users combines their individual copies in an attempt to remove the underlying fingerprints. Hayashi et. al have proposed hierarchical fingerprinting scheme using the CDMA technique which designed a fingerprint signal by a combination of quasi-orthogonal sequences to increase the allowable number of users. In this paper, we formalize the model of collusion from the viewpoint of a communication channel, and propose a removal operation considering the interference among fingerprints. We also explore the characteristic of the proposed detector and the effects of the removal operation on a detection sequence. By introducing two kinds of thresholds for the determination of the presence of fingerprints, the performance of the proposed detector is enhanced effectively.