We develop a framework of construction strategies for traceability codes on the subject of multimedia fingerprinting, which constructs traceability codes in a concatenated way. In fingerprinting systems, there are tradeoffs among the size of the customer base, the collusion resilience, and the codeword length. Our goal is to find a strategy to construct, traceability codes that reach an equilibrium among these tradeoffs. Instead of investigating a “high-performance” code, which has proven challenging in existing researches, we introduce a concatenated construction methodology to provide a flexible approach for producing more applicable traceability codes by composing several existing “low-performance” collusion-secure codes. Instead of just giving an example constructed by specific codes, we describe a general code construction strategy and give a detailed analysis on it. Moreover, we propose two concatenated construction schemes based on group fingerprinting to show the feasibility of the concatenated construction strategy. Experimental results show good performances on the code length, detection time, and tracing ability.
Visible watermarking schemes are common IPR protection mechanisms for digital images and videos that have to be released for certain purposes but illegal reproductions of them are prohibited. Digital data embedded with visible watermarks will contain recognizable but unobtrusive copyright patterns, and the details of the host data are supposed to exist. The embedded pattern of a useful visible watermarking scheme should be difficult or impossible to be removed unless exhaustive and expensive labors are involved. In this paper, we propose a general attacking scheme against current visible image watermarking techniques.
In this paper, a genetic algorithm (GA) based watermark optimization technique for digital image watermarking is proposed. In our approach, watermark embedding positions are simulated by chromosomes, and several GA optimization operators such as reproduction, crossover, and mutation are used. The experimental result shows that the proposed approach can effectively improve the quality of the watermarked image and the robustness of the embedded watermark against various attacks. By analyzing the distribution of embedding positions, we found that watermark embedding positions are highly correlated to the energy distribution of block-DCT coefficients.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.