Jump to ContentJump to Main Navigation
Show Summary Details
In This Section

Annual of Navigation

The Journal of Polish Navigational Forum

1 Issue per year

Open Access
See all formats and pricing
In This Section

Protection of Visual Data Transmission for Vessel Traffic Systems Using Joint Fingerprinting and Decryption Method Based on Modified Hill Cipher

Bartosz Czaplewski
  • Gdansk University of Technology
/ Krzysztof Czaplewski
  • Polish Naval Academy
Published Online: 2013-07-27 | DOI: https://doi.org/10.2478/v10367-012-0014-8


Vessel traffic systems provide a high level of safety on coastal waters due to coastal radar stations and industrial cameras transmitting information to traffic supervision centers, as well. To improve a vessel traffic services is very important to ensure the speed and secrecy for the transmission of video images.

The paper presents the basic issues of the multimedia data protection by digital watermarking and fingerprinting methods. Main applications for such digital marking were described in the paper as well as its requirements. Furthermore, the importance of multicast transmission for fingerprinting methods was presented by comparing the scalability of methods using only unicast transmissions and methods using multicast transmissions. The paper also presents the greatest threat to fingerprinting methods, which are attacks performed by more than one pirate. These attacks are called collusion attacks. The criteria that should be followed during identifying rogue users taking part in the collusion attack on the security systems has been presented.

The paper also contains description of the extended Hillcast method, which belongs to the group of JFD (Joint Fingerprinting and Decryption) methods. The method provides a cryptographic security and digital fingerprinting of multimedia content, while maintaining high scalability. Main purpose of this method is VoD (Video on Demand) service, but it can also be used in vessel traffic supervision systems, such as VTS and AIS. In the last part of paper, there are results of studies which indicate high resistance to most common collusion attacks. Method proposed by authors can enhance the security of visual data transmission in vessel traffic systems.

Keywords: data protecting; VTS; fingerprinting; Hill cipher

  • [1] Anderson R., Manifavas C., Chameleon - A new kind of stream cipher, Lecture Notes in Computer Science, Fast Software Encryption, E. Biham, ed. Heidelberg, Springer-Verlag, 1997, pp. 107-113.

  • [2] Barcz M., Review and analysis of fingerprinting methods for multicast distribution of video signals, Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics, master thesis, 2009.

  • [3] He S., Wu M., Joint Coding and Embedding Techniques for Multimedia Fingerprinting, IEEE Transactions on Information Forensics and Security, 2006.

  • [4] Kundur D., Karthik K., Video fingerprinting and encryption principles for digital rights management, Proc. IEEE, 2004, Vol. 92, No. 6, pp. 918-932. [Crossref]

  • [5] Liu K. J. R., Trappe W., Wang Z. J., Wu M., Zhao H., Multimedia fingerprinting forensics for traitor tracing, EURASIP Book Series on Signal Processing and Communications, 2005, Vol. 4, Hindawi Publishing Corporation.

  • [6] Rykaczewski R., Hillcast - A method of joint decryption and fingerprinting for multicast distribution of multimedia data, Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics Annals, 2010, No. 8, series: Information Technology.

  • [7] Wu M., Trappe W., Wang Z. J., Liu K. J. R., Collusion-resistant fingerprinting for multimedia, IEEE Signal Processing Mag., 2004, Vol. 21, pp.15-27.

  • [8] Zhao H., Wu M., Wang Z. J., Liu K. J. R., Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting, IEEE Trans. Image Processing, 2005, Vol. 14, No. 5, pp. 646-661. [Crossref]

About the article

Published Online: 2013-07-27

Published in Print: 2012-12-01

Citation Information: Annual of Navigation, ISSN (Online) 1640-8632, DOI: https://doi.org/10.2478/v10367-012-0014-8. Export Citation

This content is open access.

Comments (0)

Please log in or register to comment.
Log in