Abstract
Digital fingerprinting of multimedia contents involves the generation of a fingerprint, the embedding operation, and the realization of traceability from redistributed contents. Considering a buyer's right, the asymmetric property in the transaction between a buyer and a seller must be achieved using a cryptographic protocol. In the conventional schemes, the implementation of a watermarking algorithm into the cryptographic protocol is not deeply discussed. In this paper, we propose the method for implementing the spread spectrum watermarking technique in the fingerprinting protocol based on the homomorphic encryption scheme. We first develop a rounding operation which converts real values into integer and its compensation, and then explore the tradeoff between the robustness and communication overhead. Experimental results show that our system can simulate Cox's spread spectrum watermarking method into asymmetric fingerprinting protocol.
Highlights
Due to the recent advances in broad-band network and multimedia technologies, the distribution and sharing of digital multimedia contents are increasing
We propose the method for implementing the spread spectrum watermarking technique by carefully designing parameters for rounding operation
The results show that one variant, which is called the spread transform dither modulation (STDM), retains an advantage under the blind detection
Summary
Due to the recent advances in broad-band network and multimedia technologies, the distribution and sharing of digital multimedia contents are increasing. In [5,6,7,8,9], the asymmetric protocol is performed by exploiting the homomorphic property of the public-key cryptosystem that enables a seller to obtain the ciphertext of watermarked content by operating an encrypted fingerprint with an encrypted content. Since the ciphertext is computed using a buyer’s encryption key, only the buyer can decrypt it; only he can obtain the watermarked content It is desirable for the fingerprinting protocol to solve the unbinding problem such that the relation between fingerprint information and a specific transaction performed by a buyer and a seller [10]. The performance of our proposed method is evaluated by comparing it with the conventional scheme [4], which confirms the similar identification capability of illegal buyers
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.