Abstract
The easiness of using and manipulating digital media content has a volte face. In fact, although average users can simply be familiar with some manipulations such as a simple duplication, these manipulations can be dangerous with dishonest users whose target is illegal. Manipulating and duplicating digital media content via the Internet and Peer to Peer networks is available even to average users but can be used to unauthorized purposes with dishonest customers. Henceforth, facing the loss caused by unauthorized treatments and protecting the digital content become challenging to the media industry and research has led to different mechanisms of digital content protection. The aim of the multimedia distribution platforms, even Video on demand platforms, is to propose a suitable structure to the embedded fingerprints to ensure an efficient and fast tracing process in multimedia distribution platforms involving great number of users. The Tardos code has been the most popular tracing code due to its efficient tracing detection performance. One main challenge of the existing Tardos-based tracing approaches was to face the decoding complexity and the computational costs of the tracing process.
Hence, the tracing scheme we propose to improve in this paper was proposed previously as a group-based scheme which enables to construct groups of users according to a multi-level hierarchy. Based on clustering algorithm, we propose to construct groups of users’ fingerprints, and then to apply the tracing process. The main target is to show how deep is the impact of using a clustering algorithms in the hierarchical tracing scheme.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Akashi, N., Kuribayashi, M., Morii, M.: Hierarchical construction of Tardos code. In: International Symposium on Information Theory and Its Applications 2008, ISITA 2008, pp. 1–6 (2008)
Boneh, D., Kiayias, A., Montgomery, H.W.: Robust fingerprinting codes: a near optimal construction. In: Proceedings of the 10th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, 4 October 2010, pp. 3–12 (2010)
Chaabane, F., Charfeddine, M., Amar, C.B.: A multimedia tracing traitors scheme using multi-level hierarchical structure for Tardos fingerprint based audio watermarking. In: SIGMAP 2014 - Proceedings of the 11th International Conference on Signal Processing and Multimedia Applications, Vienna, Austria, 28–30 August 2014, pp. 289–296 (2014)
Chaabane, F., Charfeddine, M., Amar, C.B.: Clustering impact on group-based traitor tracing schemes. In: 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakesh, Morocco, 14–16 December 2015, pp. 440–445 (2015)
Chaabane, F., Charfeddine, M., Amar, C.B.: Novel two-level tracing scheme using clustering algorithm. J. Inf. Assur. Secur. 11(4), 179–189 (2016). 11p
Chaabane, F., Charfeddine, M., Puech, W., Amar, C.B.: A two-stage traitor tracing strategy for hierarchical fingerprints. Multimedia Tools Appl. (2016)
Charfeddine, M., Elarbi, M., Koubaa, M., Amar, C.B.: DCT based blind audio watermarking scheme. In: SIGMAP, pp. 139–144 (2010)
Choi, J., Reaz, A.S., Mukherjee, B.: A survey of user behavior in VOD service and bandwidth-saving multicast streaming schemes. IEEE Commun. Surv. Tutorials 14(1), 156–169 (2012)
Elarbi, M., Charfeddine, M., Masmoudi, S., Amar, M.: Video watermarking algorithm with BCH error correcting codes hidden in audio channel. In: IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France 11–15 April 2011, pp. 164–170 (2011)
El’arbi, M., Koubaa, M., Charfeddine, M., Amar, C.B.: A dynamic video watermarking algorithm in fast motion areas in the wavelet domain. Multimedia Tools Appl. 55(3), 579–600 (2011)
Furon, T., Pérez-Freire, L.: Worst case attacks against binary probabilistic traitor tracing codes. CoRR abs/0903.3480 (2009)
Hamida, A.B., Koubàa, M., Nicolas, H.: Hierarchical traceability of multimedia documents. In: Computational Intelligence in Cyber Security, pp. 108–113 (2011)
He, S., Wu, M.: Collusion-resistant video fingerprinting for large user group. IEEE Trans. Inf. Forensics Secur. 2(4), 697–709 (2007)
Laarhoven, T., de Weger, B.: Optimal symmetric Tardos traitor tracing schemes. CoRR abs/1107.3441 (2011)
Liu, K.: Multimedia Fingerprinting Forensics for Traitor Tracing. EURASIP Book Series on Signal Processing and Communications. Hindawi Publishing Corporation, Cairo (2005)
Liu, N., Cui, H., Chan, S.H.G., Chen, Z., Zhuang, Y.: Dissecting user behaviors for a simultaneous live and VOD IPTV system. TOMCCAP 10(3), 23 (2014)
Mejdoub, M., Fonteles, L.H., Amar, C.B., Antonini, M.: Fast indexing method for image retrieval using tree-structured lattices. In: International Workshop on Content-Based Multimedia Indexing, CBMI 2008, London, UK, 18–20 June 2008, pp. 365–372 (2008)
Peikert, C., shelat, A., Smith, A.: Lower bounds for collusion-secure fingerprinting. In: Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 472–479 (2003)
Tardos, G.: Optimal probabilistic fingerprint codes. In: STOC, pp. 116–125 (2003)
Wali, A., Ben Aoun, N., Karray, H., Ben Amar, C., Alimi, A.M.: A new system for event detection from video surveillance sequences. In: Blanc-Talon, J., Bone, D., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2010. LNCS, vol. 6475, pp. 110–120. Springer, Heidelberg (2010). doi:10.1007/978-3-642-17691-3_11
Wang, Z.J., Wu, M., Zhao, H., Liu, K.J.R., Trappe, W.: Resistance of orthogonal Gaussian fingerprints to collusion attacks. In: 2003 International Conference on Multimedia and Expo, 2003, ICME 2003. Proceedings, vol. 1, pp. I-617–I-620, July 2003
Wang, Z.J., Wu, M., Trappe, W., Liu, K.J.R.: Group-oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process. 2004(14), 2153–2173 (2004)
Ye, C., Ling, H., Zou, F., Lu, Z.: A new fingerprinting scheme using social network analysis for majority attack. Telecommun. Syst. 54(3), 315–331 (2013)
Yong, Z., Aixin, Z., Songnian, L.: DCT fingerprint classifier based group fingerprint. In: 2014 International Conference on Audio, Language and Image Processing (ICALIP), pp. 292–295, July 2014
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Chaabane, F., Charfeddine, M., Amar, C.B. (2017). An Enhanced Hierarchical Traitor Tracing Scheme Based on Clustering Algorithms. In: Martínez de Pisón, F., Urraca, R., Quintián, H., Corchado, E. (eds) Hybrid Artificial Intelligent Systems. HAIS 2017. Lecture Notes in Computer Science(), vol 10334. Springer, Cham. https://doi.org/10.1007/978-3-319-59650-1_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-59650-1_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59649-5
Online ISBN: 978-3-319-59650-1
eBook Packages: Computer ScienceComputer Science (R0)