Digital Image Processing
Object Recognition from Local Scale-Invariant Features
ICCV '99 Proceedings of the International Conference on Computer Vision-Volume 2 - Volume 2
Digital watermarking in peer to peer networks
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
A new chromatic color image watermarking and its PCA-Based implementation
ICAISC'06 Proceedings of the 8th international conference on Artificial Intelligence and Soft Computing
Anti-collusion fingerprinting for multimedia
IEEE Transactions on Signal Processing
A survey and comparison of peer-to-peer overlay network schemes
IEEE Communications Surveys & Tutorials
An SVD-based watermarking scheme for protecting rightful ownership
IEEE Transactions on Multimedia
Collusion-secure fingerprinting for digital data
IEEE Transactions on Information Theory
Hi-index | 0.00 |
In order to utilize peer-to-peer (P2P) networks in legal content distribution to benefit the legal content providers, copyright protection needs to be enhanced. In this paper, a fingerprint generation and embedding method is proposed for complex P2P file sharing networks. In this method, wavelet and principal component analysis (PCA) techniques are used for fingerprint generation. First, the wavelet technique obtains a low-frequency representation of the test image (or source file, which is assumed to be one I frame of a video with a DVD quality) and PCA finds the features of the representation. Then, a set of fingerprint matrices can be created based on a proposed algorithm. Finally, each matrix combines with the low-frequency representative to become a unique fingerprinted matrix. The fingerprinted matrix is not only much smaller than the original image in size but also contains the most important information. Without this information, the quality of the reconstructed image will be very poor. Thus, the fingerprinted file is more suitable for distribution in P2P networks, because, in the distribution stage, the uniquely fingerprinted matrix will only be dispensed by the source host and leave the rest for P2P networks to handle. On the other hand, among other frames of the same video which are not decomposed, some will be embedded with sharable fingerprints. The relationship between unique fingerprint and sharable fingerprint and the purpose of using it will be discussed in the paper. Our result indicates that the proposed fingerprint has shown strong robustness against common attacks such as Gaussian noise, median filter, and lossy compression.