DOI QR코드

DOI QR Code

Multimedia Fingerprinting in DCT Block

DCT 블록의 멀티미디어 핑거프린팅

  • 이강현 (조선대학교 전자정보공과대학 전자공학과)
  • Received : 2011.08.05
  • Accepted : 2011.09.01
  • Published : 2011.09.30

Abstract

In this paper, it was implemented an algorithm of multimedia fingerprinting in DCT block. For the improvement of the limits of DRM’s ability, the proposed algorithm could be decided a responsibility boundary to judge a traitor who falsified the content according to perform separately a watermarking of content provider and a fingerprinting of content user. At the test image size($128{\times}128$) and block size($8{\times}8$) of the content provider, the measured PSNR is Inf~46.6dB with watermarking strength ${\Theta}=0.5{\sim}1.2$, and at a number of users and user's code length are n=7,15,31,63 and l=7,15,31,64 each, the measured PSNR is Inf~46.1 with fingerprinting code length l=7,15,31,63. Finally, a traitor tracing of the falsified content is approached to a trace ratio 1 which is extended to n-1.

본 논문에서는 DCT 블럭에서 실행되는 멀티미디어 핑거프린팅 알고리즘을 구현한다. 제안된 알고리즘은 DRM의 한계성을 개선하고, 콘텐츠 제공자의 워터마킹과 콘텐츠 사용자의 핑거프린팅을 분리 수행함으로써 위조 및 변조된 콘텐츠의 부정자를 판단하는 책임경계를 결정할 수 있다. 콘텐츠 제공자의 $128{\times}128$ 영상에서 블록크기 $8{\times}8$에 워터마킹 삽입강도 ${\Theta}$는 0.5~1.2까지 적용하여 PSNR은 Inf~46.6dB로 측정되었으며, 콘텐츠 사용자는 블록크기 64 픽셀 범위 내에서 BIBD 기반 코드길이가 l=7,15,31,64를 사용자의 수 n=7,15,31,63에 따라 핑거프린팅 코드길이 또한 l=7,15,31,63으로 PSNR은 Inf~46.1로 측정되었다. 위조 및 변조된 콘텐츠의 부정자 추적은 n-1까지 확장되어 추적율은 1에 접근 되었다.

Keywords

References

  1. 노진수, 이강현 "신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출," 대한전자공학회논문지 제43권 CI편 제4호, pp. 80-87, 2006. 7
  2. Kang Hyeon RHEE, "DRM Implementation by Multimedia Fingerprint," IEEK Computer Society, Vol.46, No.3, pp. 50-56, 2009. 5
  3. Skoric B., Vladimirova T. U., Celik M., Talstra J. C., "Tardos Fingerprinting is Better Than We Thought," Information Theory, IEEE Trans., Vol. 54, Issue 8, pp. 3663-3676, 2008 https://doi.org/10.1109/TIT.2008.926307
  4. W. Trappe, M. Wu, Z. J. Wang and K. J. R. Liu. "Anti-collusion fingerprinting for multimedia," IEEE Trans. Signal Proc. 51(4), pp. 1069-1087, Apr. 2003 https://doi.org/10.1109/TSP.2003.809378
  5. Dan Boneh, James Shaw, "Collusion-Secure Fingerprinting for Digital Data," IEEE TRANS. ON INFORMATION THEORY, VOL. 44, NO. 5, pp. 1897-1905, Sept. 1998 https://doi.org/10.1109/18.705568
  6. Kang Hyeon RHEE, "Estimation of multimedia fingerprinting image," Digital Content, Multimedia Technology and its Applications (IDC), 2010 6th International Conference on, pp. 350-353, 2010
  7. Jie Yang, Ping Liu, GuoZhen Tan, "The digital fingerprint coding based on LDPC," Signal Processing, 2004. Proceedings ICSP '04, 7th Int'l Conf, Vol. 3, pp. 2600-2603, 2004
  8. Zhang Zhiguang, Chen Xiaosu, Zhou Miao, "A Digital Fingerprint Coding Based on Turbo Codes," Computational Intelligence and Security, 2007 Int'l Conf. pp. 897-901, 2007
  9. Minoru Kuribayashi, "Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique," EURASIP Journal on Information Security, 2011
  10. Defa Hu, Qiaoliang Li, "Asymmetric Fingerprinting Based on 1-out-of-n Oblivious Transfer," IEEE COMM. LETTERS, VOL. 14, NO. 5, pp. 453-455, MAY 2010 https://doi.org/10.1109/LCOMM.2010.05.100067
  11. N. AHMED, T. NATARAJAN, K. R. RAO, "Discrete Cosine Transfonn," IEEE TRANSACTIONS ON COMPUTERS, pp. 90-93, JANUARY 1974
  12. J. H. van Lint, R. M. Wilson, A Course in Combinatorics, Cambridge, Eng., Cambridge University Press, 1992
  13. S. S. Shrikhande, and Vasanti N. Bhat-Nayak, "Non-isomorphic solutions of some balanced incomplete block designs I," Journal of Combinatorial Theory, 1970
  14. http://mathworld.wolfram.com/BlockDesign.html
  15. Dinitz, J. H. and Stinson, D. R. A Brief Introduction to Design Theory, Ch. 1 in Contemporary Design Theory: A Collection of Surveys, New York: Wiley, pp. 1-12, 1992
  16. Ryser H. J. "The (b,v,r,k,lambda)-Configuration." $\S$8.1 in Combinatorial Mathematics. Buffalo, NY: Math. Assoc. Amer., pp. 96-102, 1963
  17. Jeffrey H. Dinitz, Douglas R. Stinson, Contemporary Design Theory: A Collection of Surveys, Wiley, 1992.
  18. J. Dittmann, "Combining Digital watermarks and Collusion Secure Fingerprints for Customer Copy Monitoring," Proc. IEE Seminar Sec. Image & Image Auth., pp. 128-132, Mar. 2000
  19. F. Sebe and Domingo-Ferrer, "Short 3-Secure Fingerprinting Codes for Copyright Protection," Lecture Notes in Computer Science, Vol. 2384, pp. 316-327, 2002