We develop a framework of construction strategies for traceability codes on the subject of multimedia fingerprinting, which constructs traceability codes in a concatenated way. In fingerprinting systems, there are tradeoffs among the size of the customer base, the collusion resilience, and the codeword length. Our goal is to find a strategy to construct, traceability codes that reach an equilibrium among these tradeoffs. Instead of investigating a “high-performance” code, which has proven challenging in existing researches, we introduce a concatenated construction methodology to provide a flexible approach for producing more applicable traceability codes by composing several existing “low-performance” collusion-secure codes. Instead of just giving an example constructed by specific codes, we describe a general code construction strategy and give a detailed analysis on it. Moreover, we propose two concatenated construction schemes based on group fingerprinting to show the feasibility of the concatenated construction strategy. Experimental results show good performances on the code length, detection time, and tracing ability.
This paper presents a feasible system for image fingerprinting. Two important problems of fingerprinting are the design collusion-secure codes and the watermarking strategies for the fingerprints. We address these problems by proposing hierarchical fingerprint codes and a content adaptive watermarking scheme. It is challenging to find a practical collusion-secure code for fingerprinting because of the trade-offs between the fingerprint code's length, its collusion resiliency, and the size of the customer base. Therefore, instead of pursuing a high-performance code, we construct a new fingerprint code by concatenating existing codes using a hierarchical structure. The resulting code is efficient in decoding, much shorter than existing codes for similar parameters, and thus practical for real systems. In the fingerprinting, the codes are often very long if the applicable colluder-resisting ability and large customer bases are needed. The resulting acute degradation of fingerprinted content may be unacceptable. Hence the long-length watermark must be appropriately embedded into images to preserve the image quality. We design a strength-decision algorithm, on the basis of neural networks, to adaptively embed the long-length fingerprints with suitable magnitudes into different image regions. This adaptive watermarking technique maintains the combination of robustness and imperceptibility without the effort of dealing with visual models. In addition, we analyze the disturbance due to collusion attacks on images and propose an optimization algorithm that can select better embedding positions to resist collusion attacks and preserve acceptable transparency of the watermark according to different multimedia contents. Experimental results show the high detection correctness of the traitor tracing. It implies that our fingerprinting system, constructed by applying a hierarchical fingerprint code to the content-adaptive watermarking scheme, is effective for multimedia application.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.