A Colorization Based Animation Broadcast System with Traitor Tracing Capability

  • Chih-Chieh Liu
  • Yu-Feng Kuo
  • Chun-Hsiang Huang
  • Ja-Ling Wu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4283)


Distributing video contents via broadcasting network mechanisms has become a promising business opportunity for the entertainment industry. However, since content piracy is always a serious problem, broadcasted contents must be adequately protected. Rather than implementing sophisticate key-management schemes for access control, an animation broadcast system based on colorization techniques is proposed. In the proposed system, gray-level animation video sequences are delivered via broadcast mechanisms, such as multicast, to reduce the overhead in server processing and network bandwidth. Moreover, color seeds labeled with fingerprint codes are delivered to each client through low-bandwidth auxiliary connections and then used to generate high-quality full-color animations with slight differences between versions received by each client-side device. When a user illegally duplicates and distributes the received video, his identity can be easily found out by examining features extracted from the pirated video. The proposed scheme also shows good resistance to collusion attacks where two or more users cooperate to generate an illegal copy in expectation of getting rid of legal responsibility. The proposed scheme exhibits advantages in network bandwidth, system performance and content security.


animation broadcasting traitor tracing colorization 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Sincoskie, W.D.: System Architecture for a Large Scale Video on Demand Service. Computer networks and ISDN systems 22(2) (1991)Google Scholar
  2. 2.
    Viswanathan, S., Imielinski, T.: Metropolitan Area Video-on-Demand Service Using Pyramid Broadcasting. Multimedia Systems 4(4) (1996)Google Scholar
  3. 3.
    Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion Resistant Fingerprint for Multimedia. IEEE Signal Process. Mag. 21(2) (2004)Google Scholar
  4. 4.
    Zhao, H.V., Liu, K.J.R.: Fingerprint Multicast in Secure Video Streaming. IEEE Trans. On Image Processing 15(1) (2006)Google Scholar
  5. 5.
    Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)Google Scholar
  6. 6.
    Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 47. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Lotspiech, J., Nusser, S., Pestoni, F.: Anonymous Trust: Digital Rights Management Using Broadcast Encryption. Proceedings of the IEEE, 92(6) (2004)Google Scholar
  8. 8.
    Anat, L., Dani, L., Yair, W.: Colorization Using Optimization. In: Proc. of SIGGRAPH, pp. 689–693 (2004)Google Scholar
  9. 9.
    Erik, R., Michael, A., Bruce, G., Peter, S.: Color Transfer between Images. IEEE Computer Graphics and Applications, 34–41 (2001)Google Scholar
  10. 10.
    Welsh, T., Ashikhmin, M., Mueller, K.: Transferring Color to Greyscale Images. ACM Transactions on Graphics (2002)Google Scholar
  11. 11.
    Huang, Y.C., Tung, Y.S., Chen, J.C., Wang, S.W., Wu, J.L.: An Adaptive Edge Detection Based Colorization Algorithm and Its Applications. In: Proceedings of the 13th annual ACM international conference on Multimedia (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Chih-Chieh Liu
    • 1
  • Yu-Feng Kuo
    • 2
  • Chun-Hsiang Huang
    • 2
  • Ja-Ling Wu
    • 1
    • 2
  1. 1.Graduate Institute of Networking and MultimediaNational Taiwan University 
  2. 2.Department of Computer Science and Information EngineeringNational Taiwan University 

Personalised recommendations