A DCT-domain system for robust image watermarking
Signal Processing
On codes with the identifiable parent property
Journal of Combinatorial Theory Series A
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Optimal probabilistic fingerprint codes
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
Image desynchronization for secure collusion-resilient fingerprint in compression domain
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
Desynchronization in compression process for collusion resilient video fingerprint
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
The Boneh-Shaw fingerprinting scheme is better than we thought
IEEE Transactions on Information Forensics and Security
Collusion-secure fingerprinting for digital data
IEEE Transactions on Information Theory
New paradigms for effective multicasting and fingerprinting of entertainment media
IEEE Communications Magazine
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
IEEE Transactions on Image Processing
Fingerprint multicast in secure video streaming
IEEE Transactions on Image Processing
Commutative Encryption and Watermarking in Video Compression
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
Recently, a collusion resilient video fingerprint method has been proposed utilizing desynchronization. But a question has not been considered for this method: secure transmission for multicast / broadcast. Because every copies using this method have different desynchronization, all the traditional fingerprint broadcasting techniques do not work. In this paper, we propose a method for securely broadcasting desynchronized video copies. The video is firstly lengthened and partially encrypted in the sender side and broadcasted to every user, and then on the receiver side, the video is desynchronized and embedded by fingerprint, and then decrypted. We give a method to implement this for MPEG-2 stream. Experiments indicate the effectiveness of the fingerprinted copies for collusion robustness and the efficiency of transportation. Security of the system is also analyzed with probable attacks and corresponding solution is proposed.