A Multimedia Tracing Traitors Scheme Using Multi-level Hierarchical Structure for Tardos Fingerprint Based Audio Watermarking

Faten Chaabane, Maha Charfeddine, Chokri Ben Amar

2014

Abstract

This paper presents a novel approach in tracing traitors field. It proposes a multi-level hierarchical structure to the used probabilistic fingerprinting code; the well known Tardos code. This proposed structure is performed to address the problem of computational costs and time of Tardos code during its accusation step. The generated fingerprint is embedded in the extracted audio stream of the media by an audio watermarking technique operating in the frequency domain. The watermarking technique represents an original choice compared to the existing works in the literature. We assume that the strategy of collusion is known, we compare then the performance of our tracing traitors framework against different types of attacks. We show in this paper how the proposed hierarchy and the watermarking layer have a satisfying impact on the performance of our tracing system.

References

  1. Chaabane, F., Charfeddine, M., and Amar, C. B. (2013). A survey on digital tracing traitors schemes. In Information Assurance and Security, pages 85-90.
  2. Charfeddine, M., El'arbi, M., Koubàa, M., and Amar, C. B. (2010). Dct based blind audio watermarking scheme. In SIGMAP, pages 139-144.
  3. Charpentier, A., Fontaine, C., Furon, T., and Cox, I. J. (2011). An asymmetric fingerprinting scheme based on tardos codes. In Information Hiding, pages 43-58.
  4. Charpentier, A., Xie, F., Fontaine, C., and Furon, T. (2009). Expectation maximization decoding of tardos probabilistic fingerprinting code. In Media Forensics and Security, page 72540.
  5. Choi, J., Reaz, A. S., and Mukherjee, B. (2012). A survey of user behavior in vod service and bandwidth-saving multicast streaming schemes. IEEE Communications Surveys and Tutorials, 14(1):156-169.
  6. Desoubeaux, M., Guelvouita, G. L., and Puech, W. (2011). Probabilistic fingerprinting codes used to detect traitor zero-bit watermark. In SPIE Proceedings Vol. 7880: Media Watermarking, Security, and Forensics III.
  7. Desoubeaux, M., Guelvouita, G. L., and Puech, W. (2012). Fast detection of tardos codes with boneh-shaw types. In Proc. SPIE 8303, Media Watermarking, Security, and Forensics.
  8. Furon, T., Pérez-Freire, L., Guyader, A., and Cérou, F. (2009). Estimating the minimal length of tardos code. In Information Hiding, pages 176-190.
  9. Hamida, A. B., Koubàa, M., and Nicolas, H. (2011). Hierarchical traceability of multimedia documents. In Computational Intelligence in Cyber Security, pages 108-113.
  10. Hayashi, N., Kuribayashi, M., and Morii, M. (2007). Collusion-resistant fingerprinting scheme based on the cdma-technique. In IWSEC, pages 28-43.
  11. Laarhoven, T. (2013). Dynamic traitor tracing schemes, revisited. CoRR, abs/1307.0214.
  12. Laarhoven, T. and de Weger, B. (2011). Optimal symmetric tardos traitor tracing schemes. CoRR, abs/1107.3441.
  13. Shahid, Z., Chaumont, M., and Puech, W. (2013). H.264/avc video watermarking for active fingerprinting based on tardos code. Signal, Image and Video Processing, 7(4):679-694.
  14. Tardos, G. (2003). Optimal probabilistic fingerprint codes. In STOC, pages 116-125.
  15. Wang, Z. J., Wu, M., Trappe, W., and Liu, K. J. R. (2004). Group-oriented fingerprinting for multimedia forensics. EURASIP J. Adv. Sig. Proc., 2004(14):2153- 2173.
  16. Ye, C., Ling, H., Zou, F., and Lu, Z. (2013). A new fingerprinting scheme using social network analysis for majority attack. Telecommunication Systems, 54(3):315- 331.
Download


Paper Citation


in Harvard Style

Chaabane F., Charfeddine M. and Ben Amar C. (2014). A Multimedia Tracing Traitors Scheme Using Multi-level Hierarchical Structure for Tardos Fingerprint Based Audio Watermarking . In Proceedings of the 11th International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2014) ISBN 978-989-758-046-8, pages 289-296. DOI: 10.5220/0005066602890296


in Bibtex Style

@conference{sigmap14,
author={Faten Chaabane and Maha Charfeddine and Chokri Ben Amar},
title={A Multimedia Tracing Traitors Scheme Using Multi-level Hierarchical Structure for Tardos Fingerprint Based Audio Watermarking},
booktitle={Proceedings of the 11th International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2014)},
year={2014},
pages={289-296},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005066602890296},
isbn={978-989-758-046-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2014)
TI - A Multimedia Tracing Traitors Scheme Using Multi-level Hierarchical Structure for Tardos Fingerprint Based Audio Watermarking
SN - 978-989-758-046-8
AU - Chaabane F.
AU - Charfeddine M.
AU - Ben Amar C.
PY - 2014
SP - 289
EP - 296
DO - 10.5220/0005066602890296