Traitor Tracing in Mobile Multimedia Communication

Traitor Tracing in Mobile Multimedia Communication

Shiguo Lian
Copyright: © 2009 |Pages: 15
DOI: 10.4018/978-1-60566-046-2.ch030
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Digital fingerprinting is reported and used in copy tracing. It embeds different information, for example, Customer ID, into multimedia content, produces a different copy, and sends the copy to the corresponding customer. If a copy is spread to unauthorized customers, the unique information in the copy can be detected and used to trace the illegal distributors. In this chapter, we introduce some digital fingerprinting algorithms, review the existing traitor tracing schemes, analyze the performances of some typical algorithms through comparison, and propose the future trends and some open issues in this field. It is expected to provide some valuable information to researchers or engineers working in mobile multimedia security.
Chapter Preview
Top

Background

Digital fingerprinting embeds the unique information, such as customer ID, into media content with the watermarking technology. Thus, digital watermarking is the basic of digital fingerprinting, which is introduced in this section.

Key Terms in this Chapter

Nonlinear Collusion Attack: The collusion attack that generates a new copy from various multimedia copies by nonlinear operations, such as taking the minimal, maximal or median pixels in the copies.

Collusion Attack: The operation that combines different multimedia copies together to generate a new copy in order to remove the information contained in the copies. This operation can be done by one customer or between different customers.

Digital Rights Management: The system to protect not only the security of media content but also the rights of the content provider, content distributor or customer. The media content’s security includes confidentiality, integrity, ownership, and so forth. The rights include the copyright, access right, and so forth.

Joint Fingerprint Embedding and Decryption: The technology to implement fingerprint embedding and data decryption at the same time. The input is the encrypted media copy, while the output is the decrypted media copy with a unique fingerprint, for example, the customer ID.

Linear Collusion Attack: The collusion attack that generates a new copy from various multimedia copies by linear operations, such as averaging, addition, subtraction, and so forth.

Digital Watermarking: The technology to embed information into the original data by modifying parts of the data. The produced data are still usable, from which, the information can be detected or extracted.

Digital Fingerprinting: The technology to embed unique information into multimedia content with watermarking technology. The produced copy contains the unique information that can be used to tell the ownership.

Traitor Tracing: The technology to trace the illegal distributors who distribute multimedia content to other unauthorized customers. The illegal distributor is named the traitor.

Complete Chapter List

Search this Book:
Reset