The current renaissance of 3D movies has drawn more and more attention from the audience. Three-dimensional
television (3DTV) has been expected to be the next advance in television. Studies have shown that different people have
different comfort range of depth in a 3D content, especially in 3DTV scenario, wherein much smaller screen sizes and
viewing distances in home setup than in theater put more restrictions on the 3D content fed into the 3DTV. As a result,
the version of the 3D content sent to home will not satisfy all the people in one family. In this paper, we try to solve this
problem by providing a prediction of viewing discomfort of certain input content by certain viewer. Our method is based
on the Disparity Discomfort Profile (DDP) built through subjective test for each viewer. The input content is analyzed by
studying its disparity distribution. The prediction of discomfort is performed by matching the disparity distribution with
the viewer's DDP. Then a mechanism to allow the viewers to adjust the depth range according to their visual comfort
profile or viewing preference is used to minimize the discomfort. Experiments show promising results of the proposed
method.
Digital forensic marking is a technology to discourage unauthorized redistribution of multimedia signals by embedding a
unique mark into each user's copy of the content. A powerful class of attacks on forensic marking is the collusion attack
by a group of users. Recently, a new collusion attack, called the minority attack, has been proposed against forensic
marking schemes with correlation-based detectors. Although this attack is not very effective on Gaussian-based forensic
marking, it is quite powerful on removing the traces of users when the forensic marking is binary. In this paper, we first
study the performance of an ECC-based binary forensic code under the minority attack and we model the additional
processing, such as compression, applied on colluded copy as a binary symmetric channel. We confirm that the system
can be defeated by a minority attack from only 3 colluders. To resist the minority attack, we propose a row-permuted
binary orthogonal code to serve as the inner code for ECC-based forensic code, coupled with an adaptive detector.
Experimental results show that the proposed scheme has a significantly improved resistance to a minority attack.
Digital fingerprinting is an emerging technology to protect multimedia from unauthorized use by embedding a unique fingerprint signal into each user's copy. A robust embedding algorithm is an important building block in order to make the fingerprint resilient to various distortions and collusion attacks. Spread spectrum embedding has been widely used for multimedia fingerprinting. In this paper, we explore another class of embedding methods - Quantization Index Modulation (QIM) for fingerprinting applications. We first employ Dither Modulation (DM) technique and extend it for embedding multiple symbols through a basic dither sequence design. We then develop a theoretical model and propose a new algorithm to improve the collusion resistance of the basic scheme. Simulation results show that the improvement algorithm enhances the collusion resistance, while there is still a performance gap with the existing spread spectrum based fingerprinting. We then explore coded fingerprinting based on spread transform dither modulation (STDM) embedding. Simulation results show that this coded STDM based fingerprinting has significant advantages over spread spectrum based fingerprinting under blind detection.
KEYWORDS: Multimedia, Resistance, Sensors, Information security, Signal detection, Digital watermarking, Image segmentation, Electrochemical etching, Internet
This paper proposes a group-based fingerprinting scheme employing
a joint coding and embedding strategy to trace multimedia distribution and proactively prevent the leak of multimedia information. Taking advantage of the prior knowledge on the collusion pattern, we construct compact fingerprints that consist
of user sub-codeword and group sub-codeword and are embedded in host signal via spread spectrum technique. The detection is done in two levels, which identifies guilty groups through correlation and then narrows down to specific colluders through minimum distance decoding. Experimental results show that the proposed method provides higher collusion resistance than the existing non-grouped fingerprint codes.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.