Advertisement

Multimedia Tools and Applications

, Volume 61, Issue 2, pp 389–418 | Cite as

Optimal fingerprint scheme for video on demand using block designs

  • R. Ashok KumarEmail author
  • Ganesan Kaliyaperumal
Article

Abstract

Video fingerprint is a mechanism to protect movie from the traitors and also have the capability to identify the traitors. The problem arises in video fingerprint when several traitors having the same copies of a movie with different fingerprints collude together. During the collusion the original fingerprints in the movie will be removed or attenuated. Due to this the traitors can illegally copy, duplicate, record or redistribute the movie without having legitimate permissions. To avoid illegitimate acts of the traitors, a new Video on Demand architecture is proposed in this paper. This new architecture combines the proxy caching mechanisms in the peer to peer network to support larger users group. A new video fingerprinting scheme is proposed for this architecture, which can strongly resist against collusion attacks from the traitors. To check the appropriateness of our scheme, we have analyzed some of the existing schemes. The appropriateness is analyzed in terms of efficiency, effectivity and performance. To evaluate the optimality of these schemes, we have carried out simulation for our architecture. The results from the simulation show the optimal outcome for our scheme than any existing schemes.

Keywords

Video-on-demand Peer-to-peer Segments Fingerprint Collusion Digital-right-management 

References

  1. 1.
    Ashok Kumar R, Ganesan K (2010) Video segmentation using metropolis hastings algorithm for the VCR operations. Int J Adv Media Commun 4(3):274–297CrossRefGoogle Scholar
  2. 2.
    Ashok Kumar R, Ganesan K (2010) A novel dynamic pricing scheme for contributing peers in the VoD System, springer international journal of multimedia tools and applications, doi: 10.1007/s11042-011-0750-0
  3. 3.
    Ashok Kumar R, Hareesh K, Ganesan K, Manjaiah DH (2009) M-chaining scheme for VoD application on cluster-based Markov process. Int J Adv Media Commun 3(3):277–289CrossRefGoogle Scholar
  4. 4.
    Camp LJ (2003) First principles of copyright for DRM design, in Internet Computing, IEEE. l.7(3):59–65Google Scholar
  5. 5.
    Choi CH, Oscar CA (1993) Adaptive image quantization using total variation classification. Proc Int Conf Signal Proc 2:796–799Google Scholar
  6. 6.
    Colbourn CJ, Dinitz JH (1996) The CRC handbook of combinatorial designs. CRC, Boca RatonzbMATHCrossRefGoogle Scholar
  7. 7.
    Dinitz JH, Stinson DR (1992) Contemporary design theory: a collection of surveys. Wiley, New YorkzbMATHGoogle Scholar
  8. 8.
    He S, Wu M (2007) Collusion-resistant video fingerprinting for large user group. IEEE Trans Inf Forensics Security 2(4):697–709CrossRefGoogle Scholar
  9. 9.
    Ho KM, Poon WF, Lo KT (2008) Investigating the performance of hierarchical video-on-demand system in heterogeneous environment, international conference in information networking, 2008. ICOIN, pp 1–5Google Scholar
  10. 10.
    Iwata T, Abe T, Ueda K, Sunaga H (2003) A DRM system suitable for P2P content delivery and the study on its implementation. The 9th Asia-Pacific Conference on Communications. vol.2, no., pp 806–811 Vol.2Google Scholar
  11. 11.
    Kang IK, Sinha K, Lee H-K (2006) New digital fingerprint code construction scheme using group-divisible design. IEICE Trans Fund E89-A(12):3732–3735CrossRefGoogle Scholar
  12. 12.
    Liu X, Huang T, Huo L, Mou L (2007) A DRM architecture for manageable P2P based IPTV system. in IEEE International Conference on Multimedia and Expo, Beijing, pp 899–902Google Scholar
  13. 13.
    Liu J, Rao SG, Li B, Zhang H (2008) Opportunities and challenges of peer-to-peer internet video broadcast, Proceedings of the IEEE (Invited paper), Special Issue on Recent Advances in Distributed Multimedia Communications, Vol. 96, No. 1, pp 11–24Google Scholar
  14. 14.
    Liu Z, Wu C, Li B, Zhao S (2009) Distilling superior peers in large-scale P2P streaming systems, INFOCOM 2009, IEEE, pp 82–90Google Scholar
  15. 15.
    Narsimha C, Raju KS, Jawahar CV (2008) A real-time video encryption algorithm exploiting the distribution of the DCT Coefficients, In proc. of IEEE Region 10 Conference, HCU-Hyderabad, IndiaGoogle Scholar
  16. 16.
    Nikolaidis N, Pitas I (2006) Image and video fingerprinting for digital rights management of multimedia data. Int Symp Intell Signal Proc Commun 801–807:12–15Google Scholar
  17. 17.
    Park H-J, Lee J-M, Choi J-K (2008) A video-on-demand transmission scheme for IPTV service with hybrid mechanism, IEEE international conference on communications, pp 1777–1781Google Scholar
  18. 18.
    Puri A, Aravind R (1991) Motion compensated video coding with adaptive perceptual quantization. IEEE Trans Circuits Syst Video Technol 1(4):351–361CrossRefGoogle Scholar
  19. 19.
    Rodriguez P, Tan S-M, Gkantsidis C (2006) On the feasibility of commercial, legal P2P content distribution. SIGCOMM Comp Commun 36(1):75–78CrossRefGoogle Scholar
  20. 20.
    Seol JM, Kim SW (2006) Scalable fingerprinting scheme using statistically secure anti-collusion code for large scale contents distribution. LNCS 4096:560–569Google Scholar
  21. 21.
    Shan H, Wu M (2006) Joint coding and embedding techniques for Multimedia Fingerprinting. IEEE Trans Inf Forensics Security 1(2):231–247CrossRefGoogle Scholar
  22. 22.
    Tan SH, Pang KK (1996) Classified perceptual coding with adaptive quantization. IEEE Trans Circuits Syst Video Technol 6(4):375–388CrossRefGoogle Scholar
  23. 23.
    Thouin F, Coates M (2007) Video-on-demand networks: design approaches and future challenges, in IEEE Network 21(2):42–48Google Scholar
  24. 24.
    Trappe W, Wu M, Ray Liu K (2002) Collusion-resistant fingerprinting for multimedia, in: Proceedings of the IEEE International Conference on Acoustics. Speech, and Signal Processing 4:3309–3312Google Scholar
  25. 25.
    Wong PHW, Oscar CA, Wong JWC (2000) Data hiding and watermarking in JPEG compressed domain by DC coefficient modification, proc. of spie conference of security and watermarking of multimedia contents, pp 237–244Google Scholar
  26. 26.
    Wu C, Li B (2008) On meeting P2P streaming bandwidth demand with limited supplies, in proceedings of the 15th annual SPIE/ACM international conference on multimedia computing and networking (MMCN 2008) Canada, pp 1–12Google Scholar
  27. 27.
    Wu C, Li B, Zhao S (2008) Exploring large-scale peer-to-peer live streaming topologies, in ACM transactions on multimedia computing. Commun Appl 4(3):1–23zbMATHGoogle Scholar
  28. 28.
    Wu M, Trappe W, Wang Z, Liu KJR (2004) Collusion resistant fingerprinting for multimedia. IEEE Signal Proc Mag 21(2):15–27CrossRefGoogle Scholar
  29. 29.
    Yang J, Xu X (2006) A robust anti-collusion coding in digital fingerprinting system, 8th international conference on signal processing, Beijing. 4:996–999Google Scholar
  30. 30.
    Yu Y, Lu H, Chen X, Zhang Z (2010) Group-Oriented Anti-Collusion Fingerprint Based on BIBD Code, In the 2nd International Conference on e-Business and Information System Security. 1–5, 22–23Google Scholar
  31. 31.
    Zhu G, Sang N (2008) Watermarking algorithm research and implementation based on DCT block, world academy of science, engineering and technology (45):38–42Google Scholar
  32. 32.
    Zou D, Prigent N, Bloom J (2009) Compressed video stream watermarking for peer-to-peer based content distribution network, IEEE International Conference on Multimedia and Expo, pp 1390–1393Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.School of Information Technology and EngineeringVIT UniversityVelloreIndia

Personalised recommendations