threshold T
g
from a given false-positive probabil-
ity P
g
.
T
g
=
q
2σ
2
g
erfc
−1
(2P
g
) (8)
3. If S
(i)
g
≥ T
g
, the i-th group is judged guilty group.
If a pirated copy is generated from multiple finger-
printed copies, the number of the guilty group is equal
or more than 1.
For each guilty group, the detection of colluders
involved in the group is performed as follows.
1. Calculate the similarity values S
(i, j)
u
of all users in
the i-th group.
S
(i, j)
u
= sim( ˜w,w
(i, j)
u
) (9)
2. Calculate the variance σ
2
u
of S
(i, j)
u
by considering
the property of its distribution and determine a
threshold T
u
from a given false-positive probabil-
ity P
u
.
T
u
=
q
2σ
2
u
erfc
−1
(2P
u
) (10)
3. If S
(i, j)
u
≥ T
u
, the j-th user in the i-th group is
judged guilty.
2.3 Iterative Detection
In (Hayashi et al., 2007), the fingerprint sequences
are designed by DCT basic vectors modulated by PN
sequences such as M-sequence and Gold-sequence in
order to further reduce the computational costs. Be-
cause of the assistance of fast DCT algorithm, the
computation of correlation values at the detector is
droppedto logarithmic scale. The embedding formula
used in (Hayashi et al., 2007) is Eq.(2), and hence, it
is additive watermarking. The detection procedure is
further improved in (Kuribayashi and Morii, 2008) to
catch more colluders without increasing the probabil-
ity of false-positiveby introducing the idea of iterative
detection and removal operation.
Because the sequence extracted from a pirated
copy will contain some colluders’ fingerprint signals,
they work as an interference at the detection of each
objectivesignal. For example, once a certain group ID
is detected, its signal is merely a noise at the detection
of user ID. Thus, if a detected fingerprint signal is re-
moved from the extracted sequence, the traceability
can be improved. In (Kuribayashi and Morii, 2008),
the removal operation is performed sequentially for
the detected signals and the detection procedure using
removal operation is performed iteratively. However,
due to the increase of the number of colluders, wrong
signals will be accidentally detected because the ef-
fects of interference are increased with respect to the
number. In such a case, the undetected fingerprint sig-
nal is attenuated by the removal operation.
For the detection of group ID, the false-negative
detection of fingerprinted signals is much serious be-
cause the following detection of the user ID is not
conducted. Even if the false-positive detection of
group ID is increased, the actual false-positive detec-
tion is bounded to the detection of the user ID. When
the threshold T
g
for group ID goes down, the num-
ber of detected group ID is increased. It provides the
chance for mining the corresponding user ID from
a detection sequence. If all detected signals are re-
moved as an interference, wrongly detected signals at
the detection of group ID are also removedand the de-
tection operation is performed again with the thresh-
old which goes down after the removal under a con-
stantly designed false-positive rate. Hence, the repeat
of detection operation provides the chance, regret-
fully, to detect wrong ID by mistake, which causes the
increase of the false detection. In order not to remove
too much, two kinds of thresholds both for group ID
and user ID are introduced in (Kuribayashi and Morii,
2008).
Using those two kinds of thresholds, the finger-
print signals are detected adaptively as follows. We
first detect as many suspicious group IDs as possi-
ble using a lower threshold, and the detected signals
that exceed a higher threshold are removed from the
detection sequence. Then, for the detected suspi-
cious groups, we attempt to detect the corresponding
users. The detected signals as the user ID are removed
from the detection sequence, and if the fingerprint sig-
nals of group IDs corresponding the detected user IDs
have not been removed, they are also removed. Such
operations are repeatedly performed until no user ID
is detected. Finally, some candidates of user ID are
judged using a higher threshold, and guilty users are
identified.
3 PROPOSED SCHEME
Our goal is to identify as many colluders as possible
from the sequence ˜w with small and constant false-
positiveprobability for the group-based fingerprinting
scheme that embeds spread spectrum sequences by a
multiplicative watermarking method.
For the detection of group ID, the false negative
detection of fingerprinted signals is much serious be-
cause the following detection of the user ID is not
conducted. In order to mining more colluders without
removing too much signals by the removal operation,
two kinds of thresholds both for group ID and user ID
are introduced. These thresholds and related parame-
EFFECTIVE INTERFERENCE REDUCTION METHOD FOR SPREAD SPECTRUM FINGERPRINTING
169