DOI QR코드

DOI QR Code

DCT 블록의 멀티미디어 핑거프린팅

Multimedia Fingerprinting in DCT Block

  • 이강현 (조선대학교 전자정보공과대학 전자공학과)
  • 투고 : 2011.08.05
  • 심사 : 2011.09.01
  • 발행 : 2011.09.30

초록

본 논문에서는 DCT 블럭에서 실행되는 멀티미디어 핑거프린팅 알고리즘을 구현한다. 제안된 알고리즘은 DRM의 한계성을 개선하고, 콘텐츠 제공자의 워터마킹과 콘텐츠 사용자의 핑거프린팅을 분리 수행함으로써 위조 및 변조된 콘텐츠의 부정자를 판단하는 책임경계를 결정할 수 있다. 콘텐츠 제공자의 $128{\times}128$ 영상에서 블록크기 $8{\times}8$에 워터마킹 삽입강도 ${\Theta}$는 0.5~1.2까지 적용하여 PSNR은 Inf~46.6dB로 측정되었으며, 콘텐츠 사용자는 블록크기 64 픽셀 범위 내에서 BIBD 기반 코드길이가 l=7,15,31,64를 사용자의 수 n=7,15,31,63에 따라 핑거프린팅 코드길이 또한 l=7,15,31,63으로 PSNR은 Inf~46.1로 측정되었다. 위조 및 변조된 콘텐츠의 부정자 추적은 n-1까지 확장되어 추적율은 1에 접근 되었다.

In this paper, it was implemented an algorithm of multimedia fingerprinting in DCT block. For the improvement of the limits of DRM’s ability, the proposed algorithm could be decided a responsibility boundary to judge a traitor who falsified the content according to perform separately a watermarking of content provider and a fingerprinting of content user. At the test image size($128{\times}128$) and block size($8{\times}8$) of the content provider, the measured PSNR is Inf~46.6dB with watermarking strength ${\Theta}=0.5{\sim}1.2$, and at a number of users and user's code length are n=7,15,31,63 and l=7,15,31,64 each, the measured PSNR is Inf~46.1 with fingerprinting code length l=7,15,31,63. Finally, a traitor tracing of the falsified content is approached to a trace ratio 1 which is extended to n-1.

키워드

참고문헌

  1. 노진수, 이강현 "신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출," 대한전자공학회논문지 제43권 CI편 제4호, pp. 80-87, 2006. 7
  2. Kang Hyeon RHEE, "DRM Implementation by Multimedia Fingerprint," IEEK Computer Society, Vol.46, No.3, pp. 50-56, 2009. 5
  3. Skoric B., Vladimirova T. U., Celik M., Talstra J. C., "Tardos Fingerprinting is Better Than We Thought," Information Theory, IEEE Trans., Vol. 54, Issue 8, pp. 3663-3676, 2008 https://doi.org/10.1109/TIT.2008.926307
  4. W. Trappe, M. Wu, Z. J. Wang and K. J. R. Liu. "Anti-collusion fingerprinting for multimedia," IEEE Trans. Signal Proc. 51(4), pp. 1069-1087, Apr. 2003 https://doi.org/10.1109/TSP.2003.809378
  5. Dan Boneh, James Shaw, "Collusion-Secure Fingerprinting for Digital Data," IEEE TRANS. ON INFORMATION THEORY, VOL. 44, NO. 5, pp. 1897-1905, Sept. 1998 https://doi.org/10.1109/18.705568
  6. Kang Hyeon RHEE, "Estimation of multimedia fingerprinting image," Digital Content, Multimedia Technology and its Applications (IDC), 2010 6th International Conference on, pp. 350-353, 2010
  7. Jie Yang, Ping Liu, GuoZhen Tan, "The digital fingerprint coding based on LDPC," Signal Processing, 2004. Proceedings ICSP '04, 7th Int'l Conf, Vol. 3, pp. 2600-2603, 2004
  8. Zhang Zhiguang, Chen Xiaosu, Zhou Miao, "A Digital Fingerprint Coding Based on Turbo Codes," Computational Intelligence and Security, 2007 Int'l Conf. pp. 897-901, 2007
  9. Minoru Kuribayashi, "Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique," EURASIP Journal on Information Security, 2011
  10. Defa Hu, Qiaoliang Li, "Asymmetric Fingerprinting Based on 1-out-of-n Oblivious Transfer," IEEE COMM. LETTERS, VOL. 14, NO. 5, pp. 453-455, MAY 2010 https://doi.org/10.1109/LCOMM.2010.05.100067
  11. N. AHMED, T. NATARAJAN, K. R. RAO, "Discrete Cosine Transfonn," IEEE TRANSACTIONS ON COMPUTERS, pp. 90-93, JANUARY 1974
  12. J. H. van Lint, R. M. Wilson, A Course in Combinatorics, Cambridge, Eng., Cambridge University Press, 1992
  13. S. S. Shrikhande, and Vasanti N. Bhat-Nayak, "Non-isomorphic solutions of some balanced incomplete block designs I," Journal of Combinatorial Theory, 1970
  14. http://mathworld.wolfram.com/BlockDesign.html
  15. Dinitz, J. H. and Stinson, D. R. A Brief Introduction to Design Theory, Ch. 1 in Contemporary Design Theory: A Collection of Surveys, New York: Wiley, pp. 1-12, 1992
  16. Ryser H. J. "The (b,v,r,k,lambda)-Configuration." $\S$8.1 in Combinatorial Mathematics. Buffalo, NY: Math. Assoc. Amer., pp. 96-102, 1963
  17. Jeffrey H. Dinitz, Douglas R. Stinson, Contemporary Design Theory: A Collection of Surveys, Wiley, 1992.
  18. J. Dittmann, "Combining Digital watermarks and Collusion Secure Fingerprints for Customer Copy Monitoring," Proc. IEE Seminar Sec. Image & Image Auth., pp. 128-132, Mar. 2000
  19. F. Sebe and Domingo-Ferrer, "Short 3-Secure Fingerprinting Codes for Copyright Protection," Lecture Notes in Computer Science, Vol. 2384, pp. 316-327, 2002