全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
PLOS ONE  2013 

A Collusion-Resistant Fingerprinting System for Restricted Distribution of Digital Documents

DOI: 10.1371/journal.pone.0081976

Full-Text   Cite this paper   Add to My Lib

Abstract:

Digital fingerprinting is a technique that consists of inserting the ID of an authorized user in the digital content that he requests. This technique has been mainly used to trace back pirate copies of multimedia content such as images, audio, and video. This study proposes the use of state-of-the-art digital fingerprinting techniques in the context of restricted distribution of digital documents. In particular, the system proposed by Kuribayashi for multimedia content is investigated. Extensive simulations show the robustness of the proposed system against average collusion attack. Perceptual transparency of the fingerprinted documents is also studied. Moreover, by using an efficient Fast Fourier Transform core and standard computer machines it is shown that the proposed system is suitable for real-world scenarios.

References

[1]  Adobe (2010) Making the case PDF/A and Adobe Acrobat. White paper, Adobe Systems Incorporated., Available: http://goo.gl/F4ZkL - Accessed 2013 Jun 22.
[2]  Gupta R, Karayil A, Rajendran R (2008) Contract lifecycle management. White paper, Infosys, Available: http://goo.gl/aEQj9 - Accessed 2013 Jun 22.
[3]  Villars SFRL (2006) The information lifecycle management imperative. White paper, IDC Information and data, Available: http://goo.gl/4aOqo - Accessed 2013 Jun 22.
[4]  Berghel H (2012) Wikileaks and the matter of private manning. Computer 45: : 70–73.
[5]  Coles-Kemp L, Theoharidou M (2010) Insider threat and information security management. In:Probst CW, Hunker J, Gollmann D, Bishop M, editors, Insider Threats in Cyber Security, Springer US, volume 49 of Advances in Information Security. pp.45–71.
[6]  Kessler G (2012) Information security: New threats or familiar problems? Computer 45: : 59–65.
[7]  Gaff BM, Loren RA, Spinney EA (2012) Intellectual Property, Part II. Computer 45: : 9–11.
[8]  Cox I (1997) Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6: 1673–1687.
[9]  Garcia-Hernandez JJ, Feregrino-Uribe C, Cumplido R (2013) Collusion-resistant audio fingerprinting system in the modulated complex lapped transform domain. PLoS ONE 8: e65985.
[10]  Cox IJ, Kilian J, Leighton T, Shamoon T (1996) Secure spread spectrum watermarking for images, audio and video. In: International Conference on Image Processing, 1996. Proceedings. volume 3 , pp. 243–246.
[11]  Schick R, Ruland C (2011) Document tracking - on the way to a new security service. In: 2011 Conference on Network and Information Systems Security (SAR-SSI). pp. 1–5.
[12]  Jalil Z, Mirza A (2009) A review of digital watermarking techniques for text documents. In: International Conference on Information and Multimedia Technology. ICIMT '09. pp. 230–234.
[13]  Zhou X, Wang Z, Zhao W, Wang S, Yu J (2009) Performance analysis and evaluation of text watermarking. In: International Symposium on Computer Network and Multimedia Technology. pp. 1–4.
[14]  Zhou X, Zhao W,Wang Z, Pan L (2009) Security theory and attack analysis for text watermarking. In: International Conference on E-Business and Information System Security. EBISS '09. pp. 1–6.
[15]  Brassil JT, Member S, Low S, O'Gorman L, Maxemchuk NF (1995) Electronic marking and identification techniques to discourage document copying. In: IEEE Journal on Selected Areas in Communications. pp. 1278–1287.
[16]  Low S, Maxemchuk N, Lapone A (1998) Document identification for copyright protection using centroid detection. IEEE Transactions on Communications 46: : 372–383.
[17]  Brassil J, Low S, Maxemchuk NF, O'Gorman L (1994) Hiding information in document images. In: Conference on Information Sciences and Systems (CISS-95). pp. 482–489.
[18]  Low S, Maxemchuk N, Brassil J, O'Gorman L (1995) Document marking and identification using both line and word shifting. In: INFOCOM '95, Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies. pp. 853–860 vol.2.
[19]  Chotikakamthorn N (1998) Electronic document data hiding technique using inter-character space. In: The 1998 IEEE Asia-Pacific Conference on Circuits and Systems. IEEE APCCAS 1998. pp. 419–422.
[20]  Alattar AM, Alattar OM (2004) Watermarking electronic text documents containing justified paragraphs and irregular line spacing. In: Delp EJ, Wong PW, editors, Security, Steganography, and Watermarking of Multimedia Contents. SPIE, volume 5306 of Proceedings of SPIE, pp. 685–695.
[21]  Kim YW, Moon KA, Oh IS (2003) A text watermarking algorithm based on word classification and inter-word space statistics. In: Proceedings Seventh International Conference on Document Analysis and Recognition 2003. pp. 775–779.
[22]  Huang D, Yan H (2001) Interword distance changes represented by sine waves for watermarking text images. IEEE Transactions on Circuits and Systems for Video Technology 11: 1237–1245.
[23]  Low SH, Maxemchuk NF (2000) Capacity of text marking channel. IEEE Signal Processing Letters 7: 345–347.
[24]  Choo HG, Kim WY (2004) Data-hiding capacity improvement for text watermarking using space coding method. In: Kalker T, Cox I, Ro Y, editors, Digital Watermarking, Springer Berlin Heidelberg, volume 2939 of Lecture Notes in Computer Science. pp. 593–599.
[25]  Yawai W, Hiransakolwong N (2012) Increase the hiding-bit capacity and strength for text watermarking with the line intersection on text image. In: 8th International Conference on Computing Technology and Information Management (ICCM). volume 1, pp. 427–433.
[26]  Tang YL, Huang YT (2010) Print-and-scan resilient watermarking for authenticating paper-based certificates. In: 2010 First International Conference on Pervasive Computing Signal Processing and Applications (PCSPA). pp. 357–361.
[27]  Lefebvre F, Gueluy A, Delannay D, Macq B (2001) A print and scan optimized watermarking scheme. In: 2001 IEEE Fourth Workshop on Multimedia Signal Processing. pp. 511–516.
[28]  Qadir M, Ahmad I (2005) Digital text watermarking: secure content delivery and data hiding in digital documents. In: 39th Annual 2005 International Carnahan Conference on Security Technology, 2005. CCST '05. pp. 101–104.
[29]  He B, Wu Y, Kang K, Guo W (2009) A robust binary text digital watermarking algorithm for print-scan process. In: 2009 WRI World Congress on Computer Science and Information Engineering. volume 7, pp. 290–294.
[30]  Wang ZJ, Wu M, Trappe W, Liu KJR (2004) Group-oriented fingerprinting for multimedia forensics. EURASIP Journal on Applied Signal Processing 2004: 2153–2173.
[31]  Kuribayashi M (2011) Hierarchical spread spectrum fingerprinting scheme based on CDMA technique. EURASIP Journal on Information Security 2011: 16.
[32]  de Madrid A (2013). Biblioteca Digital del Ateneo de Madrid. Available: http://goo.gl/eioo6. - Accessed 2013 Jun 22.
[33]  Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM. In: 20th International Conference on Pattern Recognition (ICPR). Washington, DC, USA, pp. 2366–2369.
[34]  Frigo M, Johnson S (2005) The design and implementation of fftw3. Proceedings of the IEEE 93: 216–231.
[35]  Ismail Avcbas BS (1999) Statistical analysis of image quality measures. Technical report, Department of Electrical and Electronic Engineering, Bogazi?i University, ?stanbul, Turkey.
[36]  Wang Z, Bovik A, Sheikh H, Simoncelli E (2004) Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 13: 600–612.
[37]  Frank Warmerdam MW Andrey Kiselev, Kelly D (2013). Libtiff. Available: http://www.libtiff.org/. - Accessed 2013 Jun 22.
[38]  IJG (2013). Libjpeg. Available: http://www.ijg.org/. - Accessed 2013 Jun 22.
[39]  Distler T (2013). IQA. Available: http://tdistler.com/iqa/. - Accessed 2013 Jun 22.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133