Skip to main content

Video Fingerprinting System Using Wavelet and Error Correcting Code

  • Conference paper
Information Security Applications (WISA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3786))

Included in the following conference series:

Abstract

In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the tree, the legitimate users as the leaves, and the internal nodes as content buyer or seller. Because there is a limited number of user areas available in each tree, we propose to build sub-trees, where each sub-tree has a distinctive logo. In this paper, we will use logos which are bit mapped images of the tree number. The extracted logo shows better performance visually using ECC. The fingerprinting step is achieved by the insertion of a unique information in the video wavelet coefficients by temporal wavelet transform. Our fingerprinting system is able to detect unique fingerprinting information in video content even if it has been distorted. In addition, our method does not need original video frame for extraction step.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Judge, P., Ammar, M.: Security Issues and Solutions in Multicast Content Distribution: A Survey. IEEE Network 17, 30–36 (2003)

    Article  Google Scholar 

  2. Furht, B., Kirovski, B.: Multimedia Security Handbook. CRC Press, Boca Raton (2005)

    Google Scholar 

  3. Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)

    Google Scholar 

  4. Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)

    Google Scholar 

  5. Domingo-Ferrer, J.: Anonymous Fingerprinting Based on Committed Oblivious Transfer. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 43–52. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  6. Wang, Y., Lu, S., Liu, Z.: A Simple Anonymous Fingerprinting Scheme Based on Blind Signature. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 260–268. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Kuribayashi, M., Tanaka, H.: A Watermarking Scheme Applicable for Fingerprinting Protocol. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 532–543. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Ahmet, M.E.: Multimedia Security in Group Communication: Recent Progress in Key Management, Authentication, and Watermarking. Multimedia Systems 9(3), 239–248 (2003)

    Article  Google Scholar 

  9. Emmanuel, S., Kankanhalli, M.S.: A Digital Rights Management Scheme for Broadcast Video. Multimedia Systems 8(6) (2003)

    Google Scholar 

  10. Kundur, D., Karthik, K.: Video Fingerprinting and Encryption Principles for Digital Rights Management. Proceedings of the IEEE 92(6), 918–932 (2004)

    Article  Google Scholar 

  11. Wang, Y., Doherty, J., Dyck, R.V.: A Watermarking Algorithm for Fingerprinting Intelligence Images. In: Conference on Information Sciences and Systems (2001)

    Google Scholar 

  12. Swanson, M.D., Zhu, B., Tewfik, A.H.: Multiresolution Scene-based Video Watermarking using Perceptual Models. IEEE Journal on Selected Areas in Comm. 16(4), 540–550 (1998)

    Article  Google Scholar 

  13. Sagetong, P., Zhou, W.: Dynamic Wavelet Feature-based Watermarking for Copyright Tracking in digital Movie Distribution Systems. In: IEEE International Conference of Imaging Processing (September 2002)

    Google Scholar 

  14. Yang, J., Lee, M.H., Liu, Q., Tan, G.Z., Wan, X.: Robust 3D Wavelet Video Watermarking. In: IEEE International Conference on Consumer Electronics (June 2003)

    Google Scholar 

  15. Li, Y., Gao, X., Ji, H.: A 3D Wavelet Based Spatial-Temporal Approach for Video Watermarking. In: International Conference on Computational Intelligence and Multimedia Applications (September 2003)

    Google Scholar 

  16. Lee, C.H., Lee, Y.K.: An Adaptive Digital Image Watermarking Technique For Copyright Protection. IEEE Trans. On Consumer Electronics 45(4), 1005–1015 (1999)

    Article  Google Scholar 

  17. Burrus, C.S., Gopinath, R.A., Guo, H.: Introduction to Wavelets and Wavelet Transforms. Prentice-Hall, Englewood Cliffs (1997)

    Google Scholar 

  18. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, Academic Press (2002)

    Google Scholar 

  19. Cox, I.J., Kilian, J., Leighton, T., Shanmoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. On Image Processing 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  20. Stone, H.: Analysis of Attacks on Image Watermarks with Randomized Coefficients. NEC Technical Report (1996)

    Google Scholar 

  21. Wahadaniah, V., Guan, Y.L., Chua, H.C.: A New Collusion Attack and Its Performance Evaluation. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 64–80. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kang, H. et al. (2006). Video Fingerprinting System Using Wavelet and Error Correcting Code. In: Song, JS., Kwon, T., Yung, M. (eds) Information Security Applications. WISA 2005. Lecture Notes in Computer Science, vol 3786. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11604938_12

Download citation

  • DOI: https://doi.org/10.1007/11604938_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31012-9

  • Online ISBN: 978-3-540-33153-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics