Skip to main content

An Enhanced Hierarchical Traitor Tracing Scheme Based on Clustering Algorithms

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10334))

Abstract

The easiness of using and manipulating digital media content has a volte face. In fact, although average users can simply be familiar with some manipulations such as a simple duplication, these manipulations can be dangerous with dishonest users whose target is illegal. Manipulating and duplicating digital media content via the Internet and Peer to Peer networks is available even to average users but can be used to unauthorized purposes with dishonest customers. Henceforth, facing the loss caused by unauthorized treatments and protecting the digital content become challenging to the media industry and research has led to different mechanisms of digital content protection. The aim of the multimedia distribution platforms, even Video on demand platforms, is to propose a suitable structure to the embedded fingerprints to ensure an efficient and fast tracing process in multimedia distribution platforms involving great number of users. The Tardos code has been the most popular tracing code due to its efficient tracing detection performance. One main challenge of the existing Tardos-based tracing approaches was to face the decoding complexity and the computational costs of the tracing process.

Hence, the tracing scheme we propose to improve in this paper was proposed previously as a group-based scheme which enables to construct groups of users according to a multi-level hierarchy. Based on clustering algorithm, we propose to construct groups of users’ fingerprints, and then to apply the tracing process. The main target is to show how deep is the impact of using a clustering algorithms in the hierarchical tracing scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Akashi, N., Kuribayashi, M., Morii, M.: Hierarchical construction of Tardos code. In: International Symposium on Information Theory and Its Applications 2008, ISITA 2008, pp. 1–6 (2008)

    Google Scholar 

  2. Boneh, D., Kiayias, A., Montgomery, H.W.: Robust fingerprinting codes: a near optimal construction. In: Proceedings of the 10th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, 4 October 2010, pp. 3–12 (2010)

    Google Scholar 

  3. Chaabane, F., Charfeddine, M., Amar, C.B.: A multimedia tracing traitors scheme using multi-level hierarchical structure for Tardos fingerprint based audio watermarking. In: SIGMAP 2014 - Proceedings of the 11th International Conference on Signal Processing and Multimedia Applications, Vienna, Austria, 28–30 August 2014, pp. 289–296 (2014)

    Google Scholar 

  4. Chaabane, F., Charfeddine, M., Amar, C.B.: Clustering impact on group-based traitor tracing schemes. In: 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakesh, Morocco, 14–16 December 2015, pp. 440–445 (2015)

    Google Scholar 

  5. Chaabane, F., Charfeddine, M., Amar, C.B.: Novel two-level tracing scheme using clustering algorithm. J. Inf. Assur. Secur. 11(4), 179–189 (2016). 11p

    Google Scholar 

  6. Chaabane, F., Charfeddine, M., Puech, W., Amar, C.B.: A two-stage traitor tracing strategy for hierarchical fingerprints. Multimedia Tools Appl. (2016)

    Google Scholar 

  7. Charfeddine, M., Elarbi, M., Koubaa, M., Amar, C.B.: DCT based blind audio watermarking scheme. In: SIGMAP, pp. 139–144 (2010)

    Google Scholar 

  8. Choi, J., Reaz, A.S., Mukherjee, B.: A survey of user behavior in VOD service and bandwidth-saving multicast streaming schemes. IEEE Commun. Surv. Tutorials 14(1), 156–169 (2012)

    Article  Google Scholar 

  9. Elarbi, M., Charfeddine, M., Masmoudi, S., Amar, M.: Video watermarking algorithm with BCH error correcting codes hidden in audio channel. In: IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France 11–15 April 2011, pp. 164–170 (2011)

    Google Scholar 

  10. El’arbi, M., Koubaa, M., Charfeddine, M., Amar, C.B.: A dynamic video watermarking algorithm in fast motion areas in the wavelet domain. Multimedia Tools Appl. 55(3), 579–600 (2011)

    Article  Google Scholar 

  11. Furon, T., Pérez-Freire, L.: Worst case attacks against binary probabilistic traitor tracing codes. CoRR abs/0903.3480 (2009)

    Google Scholar 

  12. Hamida, A.B., Koubàa, M., Nicolas, H.: Hierarchical traceability of multimedia documents. In: Computational Intelligence in Cyber Security, pp. 108–113 (2011)

    Google Scholar 

  13. He, S., Wu, M.: Collusion-resistant video fingerprinting for large user group. IEEE Trans. Inf. Forensics Secur. 2(4), 697–709 (2007)

    Article  Google Scholar 

  14. Laarhoven, T., de Weger, B.: Optimal symmetric Tardos traitor tracing schemes. CoRR abs/1107.3441 (2011)

    Google Scholar 

  15. Liu, K.: Multimedia Fingerprinting Forensics for Traitor Tracing. EURASIP Book Series on Signal Processing and Communications. Hindawi Publishing Corporation, Cairo (2005)

    Book  Google Scholar 

  16. Liu, N., Cui, H., Chan, S.H.G., Chen, Z., Zhuang, Y.: Dissecting user behaviors for a simultaneous live and VOD IPTV system. TOMCCAP 10(3), 23 (2014)

    Article  Google Scholar 

  17. Mejdoub, M., Fonteles, L.H., Amar, C.B., Antonini, M.: Fast indexing method for image retrieval using tree-structured lattices. In: International Workshop on Content-Based Multimedia Indexing, CBMI 2008, London, UK, 18–20 June 2008, pp. 365–372 (2008)

    Google Scholar 

  18. Peikert, C., shelat, A., Smith, A.: Lower bounds for collusion-secure fingerprinting. In: Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 472–479 (2003)

    Google Scholar 

  19. Tardos, G.: Optimal probabilistic fingerprint codes. In: STOC, pp. 116–125 (2003)

    Google Scholar 

  20. Wali, A., Ben Aoun, N., Karray, H., Ben Amar, C., Alimi, A.M.: A new system for event detection from video surveillance sequences. In: Blanc-Talon, J., Bone, D., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2010. LNCS, vol. 6475, pp. 110–120. Springer, Heidelberg (2010). doi:10.1007/978-3-642-17691-3_11

    Chapter  Google Scholar 

  21. Wang, Z.J., Wu, M., Zhao, H., Liu, K.J.R., Trappe, W.: Resistance of orthogonal Gaussian fingerprints to collusion attacks. In: 2003 International Conference on Multimedia and Expo, 2003, ICME 2003. Proceedings, vol. 1, pp. I-617–I-620, July 2003

    Google Scholar 

  22. Wang, Z.J., Wu, M., Trappe, W., Liu, K.J.R.: Group-oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process. 2004(14), 2153–2173 (2004)

    Article  Google Scholar 

  23. Ye, C., Ling, H., Zou, F., Lu, Z.: A new fingerprinting scheme using social network analysis for majority attack. Telecommun. Syst. 54(3), 315–331 (2013)

    Article  Google Scholar 

  24. Yong, Z., Aixin, Z., Songnian, L.: DCT fingerprint classifier based group fingerprint. In: 2014 International Conference on Audio, Language and Image Processing (ICALIP), pp. 292–295, July 2014

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Faten Chaabane .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Chaabane, F., Charfeddine, M., Amar, C.B. (2017). An Enhanced Hierarchical Traitor Tracing Scheme Based on Clustering Algorithms. In: Martínez de Pisón, F., Urraca, R., Quintián, H., Corchado, E. (eds) Hybrid Artificial Intelligent Systems. HAIS 2017. Lecture Notes in Computer Science(), vol 10334. Springer, Cham. https://doi.org/10.1007/978-3-319-59650-1_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59650-1_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59649-5

  • Online ISBN: 978-3-319-59650-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics