A Colorization Based Animation Broadcast System with Traitor Tracing Capability
- 833 Downloads
Distributing video contents via broadcasting network mechanisms has become a promising business opportunity for the entertainment industry. However, since content piracy is always a serious problem, broadcasted contents must be adequately protected. Rather than implementing sophisticate key-management schemes for access control, an animation broadcast system based on colorization techniques is proposed. In the proposed system, gray-level animation video sequences are delivered via broadcast mechanisms, such as multicast, to reduce the overhead in server processing and network bandwidth. Moreover, color seeds labeled with fingerprint codes are delivered to each client through low-bandwidth auxiliary connections and then used to generate high-quality full-color animations with slight differences between versions received by each client-side device. When a user illegally duplicates and distributes the received video, his identity can be easily found out by examining features extracted from the pirated video. The proposed scheme also shows good resistance to collusion attacks where two or more users cooperate to generate an illegal copy in expectation of getting rid of legal responsibility. The proposed scheme exhibits advantages in network bandwidth, system performance and content security.
Keywordsanimation broadcasting traitor tracing colorization
Unable to display preview. Download preview PDF.
- 1.Sincoskie, W.D.: System Architecture for a Large Scale Video on Demand Service. Computer networks and ISDN systems 22(2) (1991)Google Scholar
- 2.Viswanathan, S., Imielinski, T.: Metropolitan Area Video-on-Demand Service Using Pyramid Broadcasting. Multimedia Systems 4(4) (1996)Google Scholar
- 3.Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion Resistant Fingerprint for Multimedia. IEEE Signal Process. Mag. 21(2) (2004)Google Scholar
- 4.Zhao, H.V., Liu, K.J.R.: Fingerprint Multicast in Secure Video Streaming. IEEE Trans. On Image Processing 15(1) (2006)Google Scholar
- 5.Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)Google Scholar
- 7.Lotspiech, J., Nusser, S., Pestoni, F.: Anonymous Trust: Digital Rights Management Using Broadcast Encryption. Proceedings of the IEEE, 92(6) (2004)Google Scholar
- 8.Anat, L., Dani, L., Yair, W.: Colorization Using Optimization. In: Proc. of SIGGRAPH, pp. 689–693 (2004)Google Scholar
- 9.Erik, R., Michael, A., Bruce, G., Peter, S.: Color Transfer between Images. IEEE Computer Graphics and Applications, 34–41 (2001)Google Scholar
- 10.Welsh, T., Ashikhmin, M., Mueller, K.: Transferring Color to Greyscale Images. ACM Transactions on Graphics (2002)Google Scholar
- 11.Huang, Y.C., Tung, Y.S., Chen, J.C., Wang, S.W., Wu, J.L.: An Adaptive Edge Detection Based Colorization Algorithm and Its Applications. In: Proceedings of the 13th annual ACM international conference on Multimedia (2005)Google Scholar