Anderson R., Manifavas C., Chameleon - A new kind of stream cipher, Lecture Notes in Computer Science, Fast Software Encryption, E. Biham, ed. Heidelberg, Springer-Verlag, 1997, pp. 107-113.Google Scholar
 Barcz M., Review and analysis of fingerprinting methods for multicast distribution of video signals, Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics, master thesis, 2009.Google Scholar
 He S., Wu M., Joint Coding and Embedding Techniques for Multimedia Fingerprinting, IEEE Transactions on Information Forensics and Security, 2006.Google Scholar
 Liu K. J. R., Trappe W., Wang Z. J., Wu M., Zhao H., Multimedia fingerprinting forensics for traitor tracing, EURASIP Book Series on Signal Processing and Communications, 2005, Vol. 4, Hindawi Publishing Corporation.Google Scholar
 Rykaczewski R., Hillcast - A method of joint decryption and fingerprinting for multicast distribution of multimedia data, Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics Annals, 2010, No. 8, series: Information Technology.Google Scholar
 Wu M., Trappe W., Wang Z. J., Liu K. J. R., Collusion-resistant fingerprinting for multimedia, IEEE Signal Processing Mag., 2004, Vol. 21, pp.15-27.Google Scholar
 Zhao H., Wu M., Wang Z. J., Liu K. J. R., Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting, IEEE Trans. Image Processing, 2005, Vol. 14, No. 5, pp. 646-661. CrossrefGoogle Scholar
Annual of Navigation
The Journal of Polish Navigational Forum
1 Issue per year
Protection of Visual Data Transmission for Vessel Traffic Systems Using Joint Fingerprinting and Decryption Method Based on Modified Hill Cipher
Vessel traffic systems provide a high level of safety on coastal waters due to coastal radar stations and industrial cameras transmitting information to traffic supervision centers, as well. To improve a vessel traffic services is very important to ensure the speed and secrecy for the transmission of video images.
The paper presents the basic issues of the multimedia data protection by digital watermarking and fingerprinting methods. Main applications for such digital marking were described in the paper as well as its requirements. Furthermore, the importance of multicast transmission for fingerprinting methods was presented by comparing the scalability of methods using only unicast transmissions and methods using multicast transmissions. The paper also presents the greatest threat to fingerprinting methods, which are attacks performed by more than one pirate. These attacks are called collusion attacks. The criteria that should be followed during identifying rogue users taking part in the collusion attack on the security systems has been presented.
The paper also contains description of the extended Hillcast method, which belongs to the group of JFD (Joint Fingerprinting and Decryption) methods. The method provides a cryptographic security and digital fingerprinting of multimedia content, while maintaining high scalability. Main purpose of this method is VoD (Video on Demand) service, but it can also be used in vessel traffic supervision systems, such as VTS and AIS. In the last part of paper, there are results of studies which indicate high resistance to most common collusion attacks. Method proposed by authors can enhance the security of visual data transmission in vessel traffic systems.