Digital watermarking
Anonymous Fingerprinting Based on Committed Oblivious Transfer
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
A 3D Wavelet Based Spatial-Temporal Approach for Video Watermarking
ICCIMA '03 Proceedings of the 5th International Conference on Computational Intelligence and Multimedia Applications
Multimedia Security Handbook
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
A new collusion attack and its performance evaluation
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
An adaptive digital image watermarking technique for copyright protection
IEEE Transactions on Consumer Electronics
Multiresolution scene-based video watermarking using perceptual models
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Security issues and solutions in multicast content distribution: a survey
IEEE Network: The Magazine of Global Internetworking
Tracing illegal users of video: reconsideration of tree-specific and endbuyer-specific methods
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
A viable system for tracing illegal users of video
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Hi-index | 0.00 |
In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the tree, the legitimate users as the leaves, and the internal nodes as content buyer or seller. Because there is a limited number of user areas available in each tree, we propose to build sub-trees, where each sub-tree has a distinctive logo. In this paper, we will use logos which are bit mapped images of the tree number. The extracted logo shows better performance visually using ECC. The fingerprinting step is achieved by the insertion of a unique information in the video wavelet coefficients by temporal wavelet transform. Our fingerprinting system is able to detect unique fingerprinting information in video content even if it has been distorted. In addition, our method does not need original video frame for extraction step.