Advertisement

Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption

  • Zhongxuan Liu
  • Shiguo Lian
  • Josselin Gautier
  • Ronggang Wang
  • Zhen Ren
  • Haila Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5041)

Abstract

Recently, a collusion resilient video fingerprint method has been proposed utilizing desynchronization. But a question has not been considered for this method: secure transmission for multicast / broadcast. Because every copies using this method have different desynchronization, all the traditional fingerprint broadcasting techniques do not work. In this paper, we propose a method for securely broadcasting desynchronized video copies. The video is firstly lengthened and partially encrypted in the sender side and broadcasted to every user, and then on the receiver side, the video is desynchronized and embedded by fingerprint, and then decrypted. We give a method to implement this for MPEG-2 stream. Experiments indicate the effectiveness of the fingerprinted copies for collusion robustness and the efficiency of transportation. Security of the system is also analyzed with probable attacks and corresponding solution is proposed.

Keywords

Motion Vector Receiver Side Original Video Collusion Attack Video Copy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Zhao, H.V., Liu, K.J.R.: Fingerprint Multicast in Secure Video Streaming. IEEE Trans. on Image Processing 15(1), 12–29 (2006)CrossRefGoogle Scholar
  2. 2.
    Wu, M., Trappe, W., Wang, Z.J., Liu, R.: Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine 21(2), 15–27 (2004)CrossRefGoogle Scholar
  3. 3.
    Wu, Y.D.: Linear Combination Collusion Attack and its Application on an Anti-Collusion FingerprintingGoogle Scholar
  4. 4.
    Wang, Z.J., Wu, M., Zhao, H.V., Trappe, W., Liu, K.J.R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans. Image Processing 14(6), 804–821 (2005)CrossRefGoogle Scholar
  5. 5.
    Swaminathan, A., He, S., Wu, M.: Exploring QIM based Anti-Collusion Fingerprinting for MultimediaGoogle Scholar
  6. 6.
    Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5), 1897–1905 (1998)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Schaathun, H.G.: The Boneh-Shaw fingerprinting scheme is better than we thought. IEEE Trans. Information Forensics and Security 1(2), 248–255 (2006)CrossRefGoogle Scholar
  8. 8.
    Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, STOC, pp. 116–125 (2003)Google Scholar
  9. 9.
    Hollmann, H.D.L., Lint, J.H.V., Linnartz, J.P., Tolhuizen, L.M.G.M.: On codes with the identifiable parent property. Journal of Combinatorial Theory 82, 121–133 (1998)MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Seol, J.M., Kim, S.W.: A scalable AND-ACC fingerprinting scheme for practical contents distribution. In: SPIE Visual Communications and Image Processing (2005)Google Scholar
  11. 11.
    Kang, K., Lee, C.H., Lee, H.Y., Kim, J.T., Lee, H.K.: Averaging attack resilient video fingerprinting. In: IEEE ISCAS 2005, pp. 5529–5532 (2005)Google Scholar
  12. 12.
    Jang, D., Yoo, C.D.: A novel embedding method for an anti-collusion fingerprinting by embedding both a code and an orthogonal fingerprint. In: IEEE ICASSP 2006, pp. 485–488 (2006)Google Scholar
  13. 13.
    Celik, M.U., Sharma, G., Tekalp, A.M.: Collusion-Resilient Fingerprinting by Random Pre-Warping. IEEE Signal Processing Letters 11(10), 831–835 (2004)CrossRefGoogle Scholar
  14. 14.
    Mao, Y.N., Mihcak, K.: Collusion-Resistant Intentional De-Synchronization for Digital Video Fingerprinting. In: IEEE Int. Conf. Image Processing 2005, vol. 1, pp. 237–240 (2005)Google Scholar
  15. 15.
    Liu, Z.X., Lian, S.G., Ren, Z.: Image Desynchronization for Secure Collusion-Resilient Fingerprint in Compression Domain. In: Zhuang, Y.-t., Yang, S.-Q., Rui, Y., He, Q. (eds.) PCM 2006. LNCS, vol. 4261, pp. 56–63. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  16. 16.
    Liu, Z.X., Lian, S.G., Wang, R.G., Ren, Z.: Desynchronization in compression process for collusion resilient video fingerprint. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 308–322. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  17. 17.
    Hosseini, H.M.M., Huang, F.M.: A Proxy-based System for Fingerprinting of Streaming MPEG Video. In: IEEE Pacific Rim Conference on Communications, Computers and signal Processing, vol. 1, pp. 73–76 (2003)Google Scholar
  18. 18.
    Luh, W., Kundur, D.: New Paradigms for Effective Multicasting and Fingerprinting of Entertainment Media. IEEE Communications Magazine, 77–84 (June 2005)Google Scholar
  19. 19.
    Chu, H., Qiao, L., Nahrstedt, K.: A secure multicast protocol with copyright protection. In: Proc. ACM SIGCOMM Computer Communication Rev., vol. 32, pp. 42–60 (2002)Google Scholar
  20. 20.
    Judge, P., Ammar, M.: Whim: Watermarking multicast video with a hierarchy of intermediaries. In: NOSSDAC, June 2000, Chapel Hill, NC (2000)Google Scholar
  21. 21.
    Wu, T., Wu, S.: Selective encryption and watermarking of mpeg video. In: The Int. Conf. Imaging Science, Systems, and Technology (June 1997)Google Scholar
  22. 22.
    Simitopoulos, D., Zissis, N., Georgiadis, P., Emmanouilidis, V., Strintzis, M.G.: Encryption and Watermarking for the Secure Distribution of Copyrighted MPEG Video on DVD. ACM Multimedia Systems Journal, Special Issue on Multimedia Security 9(3), 217–227 (2003)CrossRefGoogle Scholar
  23. 23.
    Kundur, D., Karthik, K.: Video Fingerprinting and Encryption Principles for Digital Rights Management. Proceedings of the IEEE 92(6), 918–932 (2004)CrossRefGoogle Scholar
  24. 24.
    Lian, S.G., Liu, Z.X., Ren, Z., Wang, H.L.: Communitative Encryption and Watermarking in Video Compression. IEEE TCSVT (accepted)Google Scholar
  25. 25.
    Lian, S.G., Liu, Z.X., Ren, Z., Wang, H.L.: Commutative watermarking and encryption for media data. Optical Engineering Letters 45(8), 080510–080511 (2006)CrossRefGoogle Scholar
  26. 26.
    Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A DCT-domain system for robust image watermarking. Signal Processing 66(3), 357–372 (1999)CrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Zhongxuan Liu
    • 1
  • Shiguo Lian
    • 1
  • Josselin Gautier
    • 1
    • 2
  • Ronggang Wang
    • 1
  • Zhen Ren
    • 1
  • Haila Wang
    • 1
  1. 1.France Telecom R & D BeijingBeijingChina
  2. 2.University of Nantes Polytech’Nantes SchoolFrance

Personalised recommendations