CFP last date
20 December 2024
Reseach Article

Digital Fingerprinting for Piracy Control

by Neha Sharma, Sukhjeet Kaur Ranade
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 4
Year of Publication: 2017
Authors: Neha Sharma, Sukhjeet Kaur Ranade
10.5120/ijca2017915568

Neha Sharma, Sukhjeet Kaur Ranade . Digital Fingerprinting for Piracy Control. International Journal of Computer Applications. 176, 4 ( Oct 2017), 18-23. DOI=10.5120/ijca2017915568

@article{ 10.5120/ijca2017915568,
author = { Neha Sharma, Sukhjeet Kaur Ranade },
title = { Digital Fingerprinting for Piracy Control },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 176 },
number = { 4 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number4/28540-2017915568/ },
doi = { 10.5120/ijca2017915568 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:41:37.727834+05:30
%A Neha Sharma
%A Sukhjeet Kaur Ranade
%T Digital Fingerprinting for Piracy Control
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 4
%P 18-23
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Aiming at the secure, robust and perceptually invisible data hiding goal, a Discrete Cosine Transform (DCT) based blind video watermarking algorithm which is robust against collusion attack is proposed in this paper. This research work embeds the binary code acting as a digital fingerprint in the video frame that uniquely recognizes the authenticated user. The fingerprints are designed in the DCT domain that resist collusion and controls piracy. The confidentiality of the original frame is achieved by embedding watermark logo at the random blocks in the successive frames of the video. This is done by using Pseudo Random Number (PRN) generator whose seed value generated by a permutation vector acts as a secret key (K). During the extraction of watermark information, the same permutation vector is used to regenerate the secret key as well as the selection of the embedding blocks. This achieves the piracy control in digital fingerprinting mechanism as none of unauthorized users can tamper the original content. The experimental results show that the proposed scheme is robust against the collusion attack.

References
  1. Boneh, D., and Shaw, J. 1996. Collusion-Secure Finger printing for Digital Data. IEEE Transactions on Information Theory. 44(5): pp.1897-1905.
  2. Barni, M., Bartolini, F., Cappellini, V., and Piva, A. 1998. A DCT- Domain System for Robust Image Watermarking. Signal Processing. vol.66: pp.357-372.
  3. Khayam, S. A. 2003. The Discrete Cosine Transform: Theory and Application. International Journal of Computer Applications. 49(10): pp.766-783.
  4. Kaur, G., and Kocchar, A. 2013. Transform Domain Analysis of Image Steganography. International Journal for Science and Emerging Technologies. 6(1): pp.29-37.
  5. Dzwonkowski, M., Rykaczewski, R., and Czaplewski, B. 2014. Digital Fingerprinting Based on Quaternion Encryption for Image Transmission. Article in Pattern Recognition Letters. vol.46: pp.11–19.
  6. Manaf, A. A., Boroujerdizade, A., and Mousavi, S. M. 2016. Collusion Resistant Digital Video Watermarking for Copyright Protection Application. International Journal of Applied Engineering Research. 11(5): pp.3484-3495.
  7. Karmakar, A., Phadikar, A., Phadikar, B. S., and Maity, G. K. 2016. A Blind Video Watermarking Scheme Resistant to Rotation and Collusion Attacks. Journal of King Saud University-Computer and Information Sciences. 28(2): pp.199-210.
Index Terms

Computer Science
Information Sciences

Keywords

DCT Collusion attack Pseudo random number Watermark embedding Robustness.