Hierarchical traceability of multimedia documents

A. B. Hamida, M. Koubàa, C. Amar, H. Nicolas
{"title":"Hierarchical traceability of multimedia documents","authors":"A. B. Hamida, M. Koubàa, C. Amar, H. Nicolas","doi":"10.1109/CICYBS.2011.5949389","DOIUrl":null,"url":null,"abstract":"Illegal copying of multimedia files has become a very common practice. Indeed, with the rapid development of means of communication, sharing, copying and illegal downloading have become a very easy handling action, at everybody's reach. The magnitude of this continuously increasing phenomenon may have a significant economic impact since it induces a marked loss on turnover. To cope with this huge problem, it becomes necessary to control video traffic and ensure traceability. Thus, each user receives a personalized media release, containing a personal identifier inserted through a robust watermarking technique. If this copy is redistributed illegally, we are able to trace the dishonest user who can be prosecuted. This expresses an urgent need for implementing a reliable fingerprinting scheme with high performances. In this context, we present in this paper a hierarchical fingerprinting system based on Tardos code in order to reduce computational costs required for the pirates' detection. Both theoretical analyses and experimental results are provided to show the performance of the proposed system.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICYBS.2011.5949389","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Illegal copying of multimedia files has become a very common practice. Indeed, with the rapid development of means of communication, sharing, copying and illegal downloading have become a very easy handling action, at everybody's reach. The magnitude of this continuously increasing phenomenon may have a significant economic impact since it induces a marked loss on turnover. To cope with this huge problem, it becomes necessary to control video traffic and ensure traceability. Thus, each user receives a personalized media release, containing a personal identifier inserted through a robust watermarking technique. If this copy is redistributed illegally, we are able to trace the dishonest user who can be prosecuted. This expresses an urgent need for implementing a reliable fingerprinting scheme with high performances. In this context, we present in this paper a hierarchical fingerprinting system based on Tardos code in order to reduce computational costs required for the pirates' detection. Both theoretical analyses and experimental results are provided to show the performance of the proposed system.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
多媒体文档的层次可追溯性
非法复制多媒体文件已成为一种非常普遍的做法。的确,随着通信手段的快速发展,共享、复制和非法下载已经成为一种非常容易处理的行为,在每个人的触手可及。这种不断增加的现象的规模可能产生重大的经济影响,因为它造成营业额的显著损失。为了应对这个巨大的问题,必须控制视频流量并确保可追溯性。因此,每个用户都会收到一个个性化的媒体发布,其中包含通过鲁棒水印技术插入的个人标识符。如果这个副本是非法重新分发的,我们可以追踪到不诚实的用户,他可以被起诉。这就迫切需要实现一种可靠、高性能的指纹识别方案。在此背景下,本文提出了一种基于Tardos代码的分层指纹识别系统,以减少检测盗版所需的计算成本。理论分析和实验结果均表明了该系统的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Genetic optimization and hierarchical clustering applied to encrypted traffic identification Design considerations for a case-based reasoning engine for scenario-based cyber incident notification Fuzzy logic based anomaly detection for embedded network security cyber sensor Security visualization: Cyber security storm map and event correlation A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1