Strategic Communications and Marketing News Bureau

Digital fingerprints could combat multimedia piracy

A paper co-written by Negar Kiyavash (right), a doctoral student, and Pierre Mouline, a professor, both in the department of electrical and computer engineering, recently won the Best Student Paper Award in the multimedia signal processing area at the International Conference on Acoustics, Speech and Signal Processing held in Toulouse, France. The paper, titled "On Optimal Collusion Strategies for Fingerprinting," discusses methods for using digital fingerprinting to trace pirated multimedia files.

Pirates, beware
A paper co-written by Negar Kiyavash (right), a doctoral student, and Pierre Mouline, a professor, both in the department of electrical and computer engineering, recently won the Best Student Paper Award in the multimedia signal processing area at the International Conference on Acoustics, Speech and Signal Processing held in Toulouse, France. The paper, titled “On Optimal Collusion Strategies for Fingerprinting,” discusses methods for using digital fingerprinting to trace pirated multimedia files.

While police use fingerprints to determine who stole a piece of property or handled a murder weapon, engineers may soon be able to use digital fingerprints to determine who pirated a multimedia file.

Negar Kiyavash, a UI doctoral student in electrical and computer engineering, is helping in the battle against multimedia piracy. Her recent paper, titled “On Optimal Collusion Strategies for Fingerprinting,” won the Best Student Paper Award in the multimedia signal processing area at the International Conference on Acoustics, Speech, and Signal Processing (ICASSP) in Toulouse, France.

Kiyavash won a $500 prize for her paper and is planning to continue her research on the subject for several more years.

Pierre Moulin, a professor of electrical and computer engineering and a researcher at the Beckman Institute for Advanced Science and Technology, is co-author of the paper. Moulin and Kiyavash have been researching theory and applications for digital fingerprinting. For instance, one could make each copy of a DVD or music file slightly different so that if it is tampered with, engineers can determine who the culprit was. A strong challenge to digital fingerprinting is mounted when two or more people collude to create a forgery that combines their individual copies, so that this forgery cannot be easily traced to the colluders involved.

“The first step is to find what the worst attack is,” Kiyavash said. “The best way for colluders to avoid being caught is to try to make the forgery as close to the original as possible, to reduce the visibility of the fingerprints.”

Kiyavash said that the more people collude, the harder it is to determine who colluded. According to Moulin, much research went toward identifying the maximum number of colluders that the fingerprinting system can cope with, i.e. the system can detect the fingerprint of at least one of the colluders.

“There are definite limits to what we could identify,” Moulin said. “For instance, depending on the nature of the media signal, we could be successful if there are as many as 100 colluders, but not 1,000.”

Kiyavash said that the more users there are, the less robust the fingerprinting system is, and the harder it is to identify a colluder. There is a tradeoff between the number of users and the number of colluders you can tolerate.

While Hollywood is already using the technology, especially in limited release films, Kiyavash said the technique is relatively new, and she is looking forward to improving it over the next few years.

“It’s very mathematical. Information theory, signal processing and coding theory, all play a central role and they are all very close to my heart,” Kiyavash said. She will finish her doctorate this fall and will continue her research as a postdoctorate fellow at the university in the spring.

“The applications go far beyond the movie piracy. Any multimedia content or form of intellectual property that you can imagine can be subjected to collusion attacks, and these attacks are facilitated by availability of peer-to-peer networks.”

Read Next

Life sciences Photo of Michael Ward standing in tall grass on a riverbank.

How are migrating wild birds affected by H5N1 infection in the U.S.?

Each spring, roughly 3.5 billion wild birds migrate from their warm winter havens to their breeding grounds across North America, eating insects, distributing plant seeds and providing a variety of other ecosystem services to stopping sites along the way. Some also carry diseases like avian influenza, a worry for agricultural, environmental and public health authorities. […]

Announcements Marcelo Garcia, professor of civil and environmental engineering at The Grainger College of Engineering.

Illinois faculty member elected to National Academy of Engineering

Champaign, Ill. — Marcelo Garcia, a professor of civil and environmental engineering in The Grainger College of Engineering, has been elected to the National Academy of Engineering.

Social sciences Male and female student embracing on the quad with flowering redbud tree and the ACES library in the background. Photo by Michelle Hassel

Dating is not broken, but the trajectories of relationships have changed

CHAMPAIGN, Ill. — According to some popular culture writers and online posts by discouraged singles lamenting their inability to find romantic partners, dating is “broken,” fractured by the social isolation created by technology, pandemic lockdowns and potential partners’ unrealistic expectations. Yet two studies of college students conducted a decade apart found that their ideas about […]

Strategic Communications and Marketing News Bureau

507 E. Green St
MC-426
Champaign, IL 61820

Email: stratcom@illinois.edu

Phone (217) 333-5010