Multimedia content screening using a dual watermarking and fingerprinting system
- 1 December 2002
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 372-381
- https://doi.org/10.1145/641007.641086
Abstract
We present a new dual watermarking and fingerprinting system, where initially all copies of a protected object are identically watermarked using a secret key, but individual detection keys are distinct. By knowing a detection key, an adversary cannot recreate the original content from the watermarked content. However, knowledge of any one detection key is sufficient for modifying the object so that a detector using that key would fail to detect the marks. Detectors using other detection keys would not be fooled, and such a modified object necessarily contains enough information about the broken detector key - the fingerprint. Our dual system limits the scope of possible attacks, when compared to classic fingerprinting systems. Under optimal attacks, the size of the collusion necessary to remove the marks without leaving a detectable fingerprint is superlinear in object size, whereas classic fingerprinting has a lower bound on collusion resistance that is approximately fourth root in object size. By using our scheme one can achieve collusion resistance of up to 900,000 users for a two hour high-definition video.Keywords
This publication has 8 references indexed in Scilit:
- Robust spread-spectrum audio watermarkingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Information Hiding Techniques for Steganography and Digital WatermakingEDPACS, 2000
- A Note on the Limits of Collusion-Resistant WatermarksPublished by Springer Nature ,1999
- On Public-Key Steganography in the Presence of an Active WardenPublished by Springer Nature ,1998
- Analysis of the Sensitivity Attack against Electronic Watermarks in ImagesPublished by Springer Nature ,1998
- Collusion-secure fingerprinting for digital dataIEEE Transactions on Information Theory, 1998
- On the limits of steganographyIEEE Journal on Selected Areas in Communications, 1998
- Randomized AlgorithmsPublished by Cambridge University Press (CUP) ,1995