Abstract
Digital fingerprinting is a technique for tracing the distribution of multimedia content, and protecting it from unauthorized manipulation. Unique identification information is embedded into each distributed copy of the signal. In a collusion attack, fingerprints are combined to remove or distort the fingerprints. Audio signals are good candidates for fingerprinting, because of the forgiving nature of the human auditory system to cross-talk between channels. We use principal components of the audio signal to construct an abstract vector space. The fingerprints are ordered rotations in that space. The rotations are determined by arrays with good correlation properties. These arrays are embedded in real audio, and are imperceptible, according to a panel of experts. These fingerprints are resistant to an averaging collusion attack by hundreds or thousands of colluders, and can withstand a worst case RandNeg attack by up to 30 colluders.
Original language | English |
---|---|
Title of host publication | Proceedings of the 4th international conference on Security of information and networks |
Editors | Joseph Pieprzk |
Place of Publication | New York NY USA |
Publisher | Association for Computing Machinery (ACM) |
Pages | 5-12 |
Number of pages | 8 |
ISBN (Print) | 9781450310208 |
DOIs | |
Publication status | Published - 2011 |
Event | International Conference on Security of Information and Networks 2011 - Macquarie Graduate School of Management, Sydney, Australia Duration: 14 Nov 2011 → 19 Nov 2011 Conference number: 4th http://www.sinconf.org/sin2011/index.htm |
Publication series
Name | International Conference Proceedings Series |
---|---|
Publisher | ACM |
Conference
Conference | International Conference on Security of Information and Networks 2011 |
---|---|
Abbreviated title | SIN 2011 |
Country | Australia |
City | Sydney |
Period | 14/11/11 → 19/11/11 |
Internet address |
Keywords
- array
- audio
- collusion
- fingerprint
- traitor tracing
- watermark
Cite this
}
Collusion resistant fingerprinting of digital audio. / Tirkel, Andrew Z.; Hall, Thomas; Osborne, Charles; Meinhold, Nicholas; Moreno, Oscar.
Proceedings of the 4th international conference on Security of information and networks. ed. / Joseph Pieprzk. New York NY USA : Association for Computing Machinery (ACM), 2011. p. 5-12 (International Conference Proceedings Series).Research output: Chapter in Book/Report/Conference proceeding › Conference Paper › Research › peer-review
TY - GEN
T1 - Collusion resistant fingerprinting of digital audio
AU - Tirkel, Andrew Z.
AU - Hall, Thomas
AU - Osborne, Charles
AU - Meinhold, Nicholas
AU - Moreno, Oscar
PY - 2011
Y1 - 2011
N2 - Digital fingerprinting is a technique for tracing the distribution of multimedia content, and protecting it from unauthorized manipulation. Unique identification information is embedded into each distributed copy of the signal. In a collusion attack, fingerprints are combined to remove or distort the fingerprints. Audio signals are good candidates for fingerprinting, because of the forgiving nature of the human auditory system to cross-talk between channels. We use principal components of the audio signal to construct an abstract vector space. The fingerprints are ordered rotations in that space. The rotations are determined by arrays with good correlation properties. These arrays are embedded in real audio, and are imperceptible, according to a panel of experts. These fingerprints are resistant to an averaging collusion attack by hundreds or thousands of colluders, and can withstand a worst case RandNeg attack by up to 30 colluders.
AB - Digital fingerprinting is a technique for tracing the distribution of multimedia content, and protecting it from unauthorized manipulation. Unique identification information is embedded into each distributed copy of the signal. In a collusion attack, fingerprints are combined to remove or distort the fingerprints. Audio signals are good candidates for fingerprinting, because of the forgiving nature of the human auditory system to cross-talk between channels. We use principal components of the audio signal to construct an abstract vector space. The fingerprints are ordered rotations in that space. The rotations are determined by arrays with good correlation properties. These arrays are embedded in real audio, and are imperceptible, according to a panel of experts. These fingerprints are resistant to an averaging collusion attack by hundreds or thousands of colluders, and can withstand a worst case RandNeg attack by up to 30 colluders.
KW - array
KW - audio
KW - collusion
KW - fingerprint
KW - traitor tracing
KW - watermark
UR - http://www.scopus.com/inward/record.url?scp=83455217332&partnerID=8YFLogxK
U2 - 10.1145/2070425.2070430
DO - 10.1145/2070425.2070430
M3 - Conference Paper
SN - 9781450310208
T3 - International Conference Proceedings Series
SP - 5
EP - 12
BT - Proceedings of the 4th international conference on Security of information and networks
A2 - Pieprzk, Joseph
PB - Association for Computing Machinery (ACM)
CY - New York NY USA
ER -