{"title":"一种基于多级层次结构的多媒体跟踪叛逆者方案,用于基于Tardos指纹的音频水印","authors":"Faten Chaabane, Maha Charfeddine, C. Amar","doi":"10.5220/0005066602890296","DOIUrl":null,"url":null,"abstract":"This paper presents a novel approach in tracing traitors field. It proposes a multi-level hierarchical structure to the used probabilistic fingerprinting code; the well known Tardos code. This proposed structure is performed to address the problem of computational costs and time of Tardos code during its accusation step. The generated fingerprint is embedded in the extracted audio stream of the media by an audio watermarking technique operating in the frequency domain. The watermarking technique represents an original choice compared to the existing works in the literature. We assume that the strategy of collusion is known, we compare then the performance of our tracing traitors framework against different types of attacks. We show in this paper how the proposed hierarchy and the watermarking layer have a satisfying impact on the performance of our tracing system.","PeriodicalId":438702,"journal":{"name":"2014 International Conference on Signal Processing and Multimedia Applications (SIGMAP)","volume":"7 10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"A multimedia tracing traitors scheme using multi-level hierarchical structure for Tardos fingerprint based audio watermarking\",\"authors\":\"Faten Chaabane, Maha Charfeddine, C. Amar\",\"doi\":\"10.5220/0005066602890296\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a novel approach in tracing traitors field. It proposes a multi-level hierarchical structure to the used probabilistic fingerprinting code; the well known Tardos code. This proposed structure is performed to address the problem of computational costs and time of Tardos code during its accusation step. The generated fingerprint is embedded in the extracted audio stream of the media by an audio watermarking technique operating in the frequency domain. The watermarking technique represents an original choice compared to the existing works in the literature. We assume that the strategy of collusion is known, we compare then the performance of our tracing traitors framework against different types of attacks. We show in this paper how the proposed hierarchy and the watermarking layer have a satisfying impact on the performance of our tracing system.\",\"PeriodicalId\":438702,\"journal\":{\"name\":\"2014 International Conference on Signal Processing and Multimedia Applications (SIGMAP)\",\"volume\":\"7 10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-08-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Signal Processing and Multimedia Applications (SIGMAP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5220/0005066602890296\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Signal Processing and Multimedia Applications (SIGMAP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0005066602890296","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A multimedia tracing traitors scheme using multi-level hierarchical structure for Tardos fingerprint based audio watermarking
This paper presents a novel approach in tracing traitors field. It proposes a multi-level hierarchical structure to the used probabilistic fingerprinting code; the well known Tardos code. This proposed structure is performed to address the problem of computational costs and time of Tardos code during its accusation step. The generated fingerprint is embedded in the extracted audio stream of the media by an audio watermarking technique operating in the frequency domain. The watermarking technique represents an original choice compared to the existing works in the literature. We assume that the strategy of collusion is known, we compare then the performance of our tracing traitors framework against different types of attacks. We show in this paper how the proposed hierarchy and the watermarking layer have a satisfying impact on the performance of our tracing system.