A viable system for tracing illegal users of video

  • Authors:
  • Hyunho Kang;Brian Kurkoski;Youngran Park;Sanguk Shin;Kazuhiko Yamaguchi;Kingo Kobayashi

  • Affiliations:
  • Graduate School of Information Systems, University of Electro-Communications, Tokyo, Japan;Dept. of Inf. and Communications Eng., University of Electro-Communications, Tokyo, Japan;Department of Information Security, Pukyong National University, Busan, Republic of Korea;Department of Information Security, Pukyong National University, Busan, Republic of Korea;Dept. of Inf. and Communications Eng., University of Electro-Communications, Tokyo, Japan;Dept. of Inf. and Communications Eng., University of Electro-Communications, Tokyo, Japan

  • Venue:
  • WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Typical uses of watermarks include copyright protection and disabling unauthorized access to content. Especially, copyright protection watermarks embed some information in the data to identify the copyright holder or content provider, while receiver-identifying watermarking, commonly referred to as fingerprinting, embeds information to identify the receiver of that copy of the content. Thus, if an unauthorized copy of the content is recovered, extracting the fingerprint will show who the initial receiver was [1][2]. In this paper we generalize our previous work [3] of a video fingerprinting system to identify the source of illegal copies. This includes a logo embedding technique, generalization of the distribution system and detailed investigation of the robustness against collusion attacks.