{"title":"A multimedia tracing traitors scheme using multi-level hierarchical structure for Tardos fingerprint based audio watermarking","authors":"Faten Chaabane, Maha Charfeddine, C. Amar","doi":"10.5220/0005066602890296","DOIUrl":null,"url":null,"abstract":"This paper presents a novel approach in tracing traitors field. It proposes a multi-level hierarchical structure to the used probabilistic fingerprinting code; the well known Tardos code. This proposed structure is performed to address the problem of computational costs and time of Tardos code during its accusation step. The generated fingerprint is embedded in the extracted audio stream of the media by an audio watermarking technique operating in the frequency domain. The watermarking technique represents an original choice compared to the existing works in the literature. We assume that the strategy of collusion is known, we compare then the performance of our tracing traitors framework against different types of attacks. We show in this paper how the proposed hierarchy and the watermarking layer have a satisfying impact on the performance of our tracing system.","PeriodicalId":438702,"journal":{"name":"2014 International Conference on Signal Processing and Multimedia Applications (SIGMAP)","volume":"7 10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Signal Processing and Multimedia Applications (SIGMAP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0005066602890296","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
This paper presents a novel approach in tracing traitors field. It proposes a multi-level hierarchical structure to the used probabilistic fingerprinting code; the well known Tardos code. This proposed structure is performed to address the problem of computational costs and time of Tardos code during its accusation step. The generated fingerprint is embedded in the extracted audio stream of the media by an audio watermarking technique operating in the frequency domain. The watermarking technique represents an original choice compared to the existing works in the literature. We assume that the strategy of collusion is known, we compare then the performance of our tracing traitors framework against different types of attacks. We show in this paper how the proposed hierarchy and the watermarking layer have a satisfying impact on the performance of our tracing system.