Fingerprinting for multimedia content broadcasting system

Research output: Contribution to journalArticle

Abstract

We investigated the traceability of illegal users to prevent illegal redistribution of pirated copies by adopting cryptographic and watermarking approaches. The former approach involves controlling the decryption key sequence issued to users, and the latter involves embedding fingerprint information into multimedia content. Since the cryptographic approach identifies illegal users from the decryption key sequence, a decrypted copy is not protected from illegal redistribution. The watermarking approach can trace illegal users if the fingerprint information is correctly extracted from a pirated copy. However, the transaction of legal distribution is one-to-one in conventional systems. In this paper, we propose a broadcast-type fingerprinting system by introducing a time-bound key management scheme based on the assumption that illegal users must financially compensate to the broadcaster for all content distributed during a certain period. In the proposed system, illegal users can be identified from the decryption key sequence issued to users as well as from pirated copies.

Original languageEnglish
Pages (from-to)52-61
Number of pages10
JournalJournal of Information Security and Applications
Volume41
DOIs
Publication statusPublished - Aug 1 2018
Externally publishedYes

Fingerprint

Watermarking
Broadcasting

Keywords

  • Asymmetric property
  • Broadcasting
  • Fingerprinting
  • Time-bound key management

ASJC Scopus subject areas

  • Software
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Cite this

@article{fa940c6aa1b246de83712fae523902b8,
title = "Fingerprinting for multimedia content broadcasting system",
abstract = "We investigated the traceability of illegal users to prevent illegal redistribution of pirated copies by adopting cryptographic and watermarking approaches. The former approach involves controlling the decryption key sequence issued to users, and the latter involves embedding fingerprint information into multimedia content. Since the cryptographic approach identifies illegal users from the decryption key sequence, a decrypted copy is not protected from illegal redistribution. The watermarking approach can trace illegal users if the fingerprint information is correctly extracted from a pirated copy. However, the transaction of legal distribution is one-to-one in conventional systems. In this paper, we propose a broadcast-type fingerprinting system by introducing a time-bound key management scheme based on the assumption that illegal users must financially compensate to the broadcaster for all content distributed during a certain period. In the proposed system, illegal users can be identified from the decryption key sequence issued to users as well as from pirated copies.",
keywords = "Asymmetric property, Broadcasting, Fingerprinting, Time-bound key management",
author = "Minoru Kuribayashi and Nobuo Funabiki",
year = "2018",
month = "8",
day = "1",
doi = "10.1016/j.jisa.2018.06.002",
language = "English",
volume = "41",
pages = "52--61",
journal = "Journal of Information Security and Applications",
issn = "2214-2134",
publisher = "Elsevier Limited",

}

TY - JOUR

T1 - Fingerprinting for multimedia content broadcasting system

AU - Kuribayashi, Minoru

AU - Funabiki, Nobuo

PY - 2018/8/1

Y1 - 2018/8/1

N2 - We investigated the traceability of illegal users to prevent illegal redistribution of pirated copies by adopting cryptographic and watermarking approaches. The former approach involves controlling the decryption key sequence issued to users, and the latter involves embedding fingerprint information into multimedia content. Since the cryptographic approach identifies illegal users from the decryption key sequence, a decrypted copy is not protected from illegal redistribution. The watermarking approach can trace illegal users if the fingerprint information is correctly extracted from a pirated copy. However, the transaction of legal distribution is one-to-one in conventional systems. In this paper, we propose a broadcast-type fingerprinting system by introducing a time-bound key management scheme based on the assumption that illegal users must financially compensate to the broadcaster for all content distributed during a certain period. In the proposed system, illegal users can be identified from the decryption key sequence issued to users as well as from pirated copies.

AB - We investigated the traceability of illegal users to prevent illegal redistribution of pirated copies by adopting cryptographic and watermarking approaches. The former approach involves controlling the decryption key sequence issued to users, and the latter involves embedding fingerprint information into multimedia content. Since the cryptographic approach identifies illegal users from the decryption key sequence, a decrypted copy is not protected from illegal redistribution. The watermarking approach can trace illegal users if the fingerprint information is correctly extracted from a pirated copy. However, the transaction of legal distribution is one-to-one in conventional systems. In this paper, we propose a broadcast-type fingerprinting system by introducing a time-bound key management scheme based on the assumption that illegal users must financially compensate to the broadcaster for all content distributed during a certain period. In the proposed system, illegal users can be identified from the decryption key sequence issued to users as well as from pirated copies.

KW - Asymmetric property

KW - Broadcasting

KW - Fingerprinting

KW - Time-bound key management

UR - http://www.scopus.com/inward/record.url?scp=85048708093&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85048708093&partnerID=8YFLogxK

U2 - 10.1016/j.jisa.2018.06.002

DO - 10.1016/j.jisa.2018.06.002

M3 - Article

AN - SCOPUS:85048708093

VL - 41

SP - 52

EP - 61

JO - Journal of Information Security and Applications

JF - Journal of Information Security and Applications

SN - 2214-2134

ER -