Genetic fingerprinting for copyright protection of multicast media

被引:24
作者
Huang, Hsiang-Cheh [1 ]
Chen, Yueh-Hong [2 ]
机构
[1] Natl Univ Kaohsiung, Kaohsiung, Taiwan
[2] Natl Chiao Tung Univ, Hsinchu, Taiwan
关键词
WATERMARKING; VIDEO;
D O I
10.1007/s00500-008-0326-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Generally speaking, comparing to the unicast or broadcast methods, it is more efficient to transmit multimedia data via the multicast method to massive users. However, the ease of delivery of multimedia data may cause the copyright of such multimedia to be easily infringed upon, and the fingerprinting scheme is one of effective means for conquering this problem. Fingerprint embedding process often generates the multimedia contents into many different versions, which have to be transmitted via the unicast method. In this paper, we propose a new genetic fingerprinting scheme for copyright protection of multicast video. In this method, the encryption and decryption keys, which aim at scrambling and descrambling multimedia contents, are first produced with genetic algorithms. Next, multimedia data are then encrypted and multicast to all users. At the same time, a secure channel is employed to unicast a designated decryption key to each user. When a user deploys the designated key to decrypt the received data, a corresponding fingerprint would be embedded into the contents. Once upon the reception of the fingerprinted multimedia content, the embedded fingerprint can be extracted shortly, and the copyright can be confirmed and assured. Experimental results demonstrate that the proposed method can transmit multimedia data to clients effectively and cause only a slight degradation in perceptual quality.
引用
收藏
页码:383 / 391
页数:9
相关论文
共 24 条
[1]  
Bloom JA, 2003, 2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I, PROCEEDINGS, P621
[2]   Collusion-secure fingerprinting for digital data [J].
Boneh, D ;
Shaw, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :1897-1905
[3]   Layered access control schemes on watermarked scalable media [J].
Chang, Feng-Cheng ;
Hang, Hsueh-Ming ;
Huang, Hsiang-Cheh .
JOURNAL OF VLSI SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2007, 49 (03) :443-455
[4]   A secure multicast protocol with copyright protection [J].
Chu, HH ;
Qiao, LT ;
Nahrstedt, K .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2002, 32 (02) :42-60
[5]   Pricing multicast communication: A cost-based approach [J].
Chuang, JCI ;
Sirbu, MA .
TELECOMMUNICATION SYSTEMS, 2001, 17 (03) :281-297
[6]  
Cox I., 2001, Digital Watermarking
[7]  
Gen M., 1997, GENETIC ALGORITHM EN
[8]  
Goldberg D. E., 1989, Genetic algorithms in machine learning, search and optimization
[9]  
Hartung F, 1997, INT CONF ACOUST SPEE, P2621, DOI 10.1109/ICASSP.1997.595326
[10]  
Holland I.H., 1975, ADAPTATION NATURAL A