{"title":"聚类对基于组的叛逆者跟踪方案的影响","authors":"Faten Chaabane, Maha Charfeddine, C. Amar","doi":"10.1109/ISDA.2015.7489270","DOIUrl":null,"url":null,"abstract":"According to the ever development of multimedia distribution systems, more than one technique was proposed in the literature to address the copyright protection issue. One key technique was to propose a fingerprinting system based on traitor tracing process to retrieve back the traitorous users who can operate in the mid-way. Some previous works agree upon the fact that users belonging to the same group have more probability to collude together. Several researchers in the tracing traitor field agree upon the fact that constructing a group-based fingerprint should enhance the detection rates of the fingerprinting system. In this paper, we propose to generate a fingerprint having the group property by using a clustering algorithm. We propose to construct a group-based fingerprint according to a DCT-based audio watermarking technique which has proven good robustness and inaudibility results. To show the impact of the classifying algorithm, a set of experimental tests are conducted to check two relevant criteria: the capacity and the security of the group-based fingerprint.","PeriodicalId":196743,"journal":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Clustering impact on group-based traitor tracing schemes\",\"authors\":\"Faten Chaabane, Maha Charfeddine, C. Amar\",\"doi\":\"10.1109/ISDA.2015.7489270\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"According to the ever development of multimedia distribution systems, more than one technique was proposed in the literature to address the copyright protection issue. One key technique was to propose a fingerprinting system based on traitor tracing process to retrieve back the traitorous users who can operate in the mid-way. Some previous works agree upon the fact that users belonging to the same group have more probability to collude together. Several researchers in the tracing traitor field agree upon the fact that constructing a group-based fingerprint should enhance the detection rates of the fingerprinting system. In this paper, we propose to generate a fingerprint having the group property by using a clustering algorithm. We propose to construct a group-based fingerprint according to a DCT-based audio watermarking technique which has proven good robustness and inaudibility results. To show the impact of the classifying algorithm, a set of experimental tests are conducted to check two relevant criteria: the capacity and the security of the group-based fingerprint.\",\"PeriodicalId\":196743,\"journal\":{\"name\":\"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDA.2015.7489270\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDA.2015.7489270","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Clustering impact on group-based traitor tracing schemes
According to the ever development of multimedia distribution systems, more than one technique was proposed in the literature to address the copyright protection issue. One key technique was to propose a fingerprinting system based on traitor tracing process to retrieve back the traitorous users who can operate in the mid-way. Some previous works agree upon the fact that users belonging to the same group have more probability to collude together. Several researchers in the tracing traitor field agree upon the fact that constructing a group-based fingerprint should enhance the detection rates of the fingerprinting system. In this paper, we propose to generate a fingerprint having the group property by using a clustering algorithm. We propose to construct a group-based fingerprint according to a DCT-based audio watermarking technique which has proven good robustness and inaudibility results. To show the impact of the classifying algorithm, a set of experimental tests are conducted to check two relevant criteria: the capacity and the security of the group-based fingerprint.