Building efficient and effective multimedia fingerprints via joint coding and embedding
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
Digital watermarking security considerations
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Group-oriented fingerprinting for multimedia forensics
EURASIP Journal on Applied Signal Processing
Content adaptive watermarking for multimedia fingerprinting
Computer Standards & Interfaces
A general model of probabilistic packet marking for IP traceback
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A Study on Digital Media Security by Hopfield Neural Network
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks, Part III
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol
Information Security and Cryptology
Iterative Detection Method for CDMA-Based Fingerprinting Scheme
Information Hiding
Performance study and improvement on ECC-based binary anti-collusion forensic code for multimedia
Proceedings of the 11th ACM workshop on Multimedia and security
Fingerprinting with minimum distance decoding
IEEE Transactions on Information Forensics and Security
Robust MC-CDMA-based fingerprinting against time-varying collusion attacks
IEEE Transactions on Information Forensics and Security
Fingerprinting compressed multimedia signals
IEEE Transactions on Information Forensics and Security
Robust audio data hiding using correlated quantization with histogram-based detector
IEEE Transactions on Multimedia
A study of traceability of CDMA-based fingerprinting scheme
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
A novel watermarking scheme resilient to video compression
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
High-rate random-like spherical fingerprinting codes with linear decoding complexity
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
M-Ary Phase Modulation for Digital Watermarking
International Journal of Applied Mathematics and Computer Science - Applied Image Processing
IH'06 Proceedings of the 8th international conference on Information hiding
New traceability codes against a generalized collusion attack for digital fingerprinting
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
An estimation attack on content-based video fingerprinting
Transactions on data hiding and multimedia security II
Fingerprinting codes for live pay-television broadcast via internet
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
Collusion-resistant fingerprinting scheme based on the CDMA-technique
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Network-based traitor-tracing technique using traffic pattern
IEEE Transactions on Information Forensics and Security
Asymmetric fingerprinting based on 1-out-of-n oblivious transfer
IEEE Communications Letters
Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer
International Journal of Information and Computer Security
A wavelet-PCA-based fingerprinting scheme for peer-to-peer video file sharing
IEEE Transactions on Information Forensics and Security
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
Information Sciences: an International Journal
Risk-distortion analysis for video collusion attacks: a mouse-and-cat game
IEEE Transactions on Image Processing
Optimal collusion attack for digital fingerprinting
Proceedings of the international conference on Multimedia
Collusion-resistant fingerprinting systems: review and recent results
Transactions on data hiding and multimedia security V
IEEE Transactions on Information Forensics and Security
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security
Interleaving embedding scheme for ECC-based multimedia fingerprinting
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
A novel collusion attack strategy for digital fingerprinting
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
A simple fingerprinting scheme for large user groups
Frontiers of Computer Science in China
Collusion resistant fingerprinting of digital audio
Proceedings of the 4th international conference on Security of information and networks
Robust watermarking of compressed JPEG images in encrypted domain
Transactions on data hiding and multimedia security VI
A new fingerprinting codes for multimedia contents
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Performance study on multimedia fingerprinting employing traceability codes
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Fingerprinting schemes. identifying the guilty sources using side information
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A video watermarking procedure based on XML documents
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
Zero-Based code modulation technique for digital video fingerprinting
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Comparison of scalable ACC and MC-CDMA for practical video fingerprinting scheme
ICIC'11 Proceedings of the 7th international conference on Advanced Intelligent Computing Theories and Applications: with aspects of artificial intelligence
Robust track-and-trace video watermarking
Security and Communication Networks
A collusion attack optimization strategy for digital fingerprinting
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) - Special Issue on Multimedia Security
A high capacity and strong robust fingerprinting for compressed images
Computers and Electrical Engineering
Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization
Journal of Systems and Software
Digital Image Authentication: A Review
International Journal of Digital Library Systems
A novel JFE scheme for social multimedia distribution in compressed domain using SVD and CA
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Wireless Personal Communications: An International Journal
Hi-index | 35.68 |
Digital fingerprinting is a technique for identifying users who use multimedia content for unintended purposes, such as redistribution. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cost-effective attack against such digital fingerprints is collusion, where several differently marked copies of the same content are combined to disrupt the underlying fingerprints. We investigate the problem of designing fingerprints that can withstand collusion and allow for the identification of colluders. We begin by introducing the collusion problem for additive embedding. We then study the effect that averaging collusion has on orthogonal modulation. We introduce a tree-structured detection algorithm for identifying the fingerprints associated with K colluders that requires O(Klog(n/K)) correlations for a group of n users. We next develop a fingerprinting scheme based on code modulation that does not require as many basis signals as orthogonal modulation. We propose a new class of codes, called anti-collusion codes (ACCs), which have the property that the composition of any subset of K or fewer codevectors is unique. Using this property, we can therefore identify groups of K or fewer colluders. We present a construction of binary-valued ACC under the logical AND operation that uses the theory of combinatorial designs and is suitable for both the on-off keying and antipodal form of binary code modulation. In order to accommodate n users, our code construction requires only O(√n) orthogonal signals for a given number of colluders. We introduce three different detection strategies that can be used with our ACC for identifying a suspect set of colluders. We demonstrate the performance of our ACC for fingerprinting multimedia and identifying colluders through experiments using Gaussian signals and real images.