Tracing illegal users of video: reconsideration of tree-specific and endbuyer-specific methods

  • Authors:
  • Hyunho Kang;Brian Kurkoski;Kazuhiko Yamaguchi;Kingo Kobayashi

  • Affiliations:
  • Graduate School of Information Systems, University of Electro-Communications, Chofu-shi, Tokyo, Japan;Dept. of Inf. and Communications Eng., University of Electro-Communications, Chofu-shi, Tokyo, Japan;Dept. of Inf. and Communications Eng., University of Electro-Communications, Chofu-shi, Tokyo, Japan;Dept. of Inf. and Communications Eng., University of Electro-Communications, Chofu-shi, Tokyo, Japan

  • Venue:
  • ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper we generalize our previous work, further the collusion robustness is supplemented by additional security and practical experiment. This includes a more efficient tree decision method, generalization of the fingerprinting system and detailed investigation of the robustness against collusion attacks. Content is distributed along a specified tree, with the seller as the root, and the buyers as the internal nodes or leaves. The fingerprinting step is achieved by the insertion of unique information in the video wavelet coefficients by temporal wavelet transform. Our system is able to detect the fingerprint even if the video content has been distorted by collusion attacks.