A two-stage traitor tracing scheme for hierarchical fingerprints - LIRMM - Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier Accéder directement au contenu
Article Dans Une Revue Multimedia Tools and Applications Année : 2017

A two-stage traitor tracing scheme for hierarchical fingerprints

Résumé

The multimedia traitor tracing field involves the embedding of a collusion secure fingerprint in the host signal to retrieve and prevent any multimedia content fraud. Trendy work aims at providing a tracing system which offers a good protection of the digital content and an efficient tracing process. These challenges depend on reducing the length of the embedded fingerprint and the complexity of the accusation process. Furthermore, addressing these issues becomes more and more relevant in media distribution applications involving an important number of users. In this paper, we propose a secure fingerprinting system based on a two-stage tracing strategy which combines two probabilistic tracing codes: Boneh Shaw with replication scheme and Tardos codes. This strategy is applied to a multilevel hierarchical fingerprint which is then embedded using a DCT-based audio watermarking technique. By taking the advantage of grouping users and applying a weight-based tracing process, the proposed fingerprinting system offers to reduce efficiently the computational costs of the tracing time. It has also a good robustness to different types of attacks. We have carried out different tests to evaluate the performance of the system in terms of robustness and imperceptibility. The experimental results show that the proposed fingerprinting system provides a suitable solution to the the infringement copyright problem in multimedia distribution platforms by reducing significantly the users’ retrieval space and performing good detection results in a reduced time.
Fichier non déposé

Dates et versions

lirmm-01707223 , version 1 (12-02-2018)

Identifiants

Citer

Faten Chaabane, Maha Charfeddine, William Puech, Chokri Ben Amar. A two-stage traitor tracing scheme for hierarchical fingerprints. Multimedia Tools and Applications, 2017, 76 (12), pp.14405-14435. ⟨10.1007/s11042-016-3749-8⟩. ⟨lirmm-01707223⟩
175 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More