Digital fingerprints combating piracy

1/1/2005 Brad Petersen, ECE Illinois

While police use fingerprints to determine who stole a piece of property or handled a murder weapon, engineers may soon be able to use digital fingerprints to determine who pirated a multimedia file. Negar Kiyavash, a doctoral student in electrical and computer engineering at the University of Illinois at Urbana-Champaign, is helping in the battle against multimedia piracy.

Written by Brad Petersen, ECE Illinois

ECE Professor Pierre Moulin and Negar Kiyavash
ECE Professor Pierre Moulin and Negar Kiyavash

While police use fingerprints to determine who stole a piece of property or handled a murder weapon, engineers may soon be able to use digital fingerprints to determine who pirated a multimedia file. Negar Kiyavash, a doctoral student in electrical and computer engineering at the University of Illinois at Urbana-Champaign, is helping in the battle against multimedia piracy.  Her recent paper entitled “On Optimal Collusion Strategies for Fingerprinting,” won the Best Student Paper Award in the multimedia signal processing area at the International Conference on Acoustics, Speech, and Signal Processing (ICASSP) in Toulouse, France.

Kiyavash won a $500 prize for her paper and is planning to continue her research on the subject for several more years. Along with Electrical and Computer Engineering Professor Pierre Moulin, Kiyavash has been researching theory and applications for digital fingerprinting. For instance, one could make each copy of a DVD or music file slightly different so that if it is tampered with, engineers can determine who the culprit was. A strong challenge to digital fingerprinting is mounted when two or more people collude to create a forgery that combines their individual copies, so that this forgery cannot be easily traced to the colluders involved.

“The first step is to find what the worst attack is,” Kiyavash said. “The best way for colluders to avoid being caught is to try to make the forgery as close to the original as possible, to reduce the visibility of the fingerprints.”

Kiyavash said that the more people collude, the harder it is to determine who colluded. According to Moulin, who co-authored the paper, much research went towards identifying the maximum number of colluders that the fingerprinting system can cope with, i.e. the system can detect the fingerprint of at least one of the colluders.

“There are definite limits to what we could identify,” he said. “For instance, depending on the nature of the media signal, we could be successful if there are as many as 100 colluders, but not 1,000.”

Kiyavash said that the more users there are, the less robust the fingerprinting system is, and the harder it is to identify a colluder. There is a tradeoff between the number of users and the number of colluders you can tolerate.

While Hollywood is already using the technology, especially in limited release films, Kiyavash said the technique is relatively new, and she is looking forward to improving it over the next few years.

“It’s very mathematical. Information theory, signal processing and coding theory, all play a central role and they are all very close to my heart,” Kiyavash said. She will finish her Ph.D. on the subject this coming Fall and she will continue her research as a post-doctorate fellow at the University in the spring.

“The applications go far beyond the movie piracy. Any multimedia content or form of intellectual property that you can imagine can be subjected to collusion attacks, and these attacks are facilitated by availability of peer-to-peer networks.”

Moulin is a researcher at the Beckman Institute for Advanced Science and Technology and the Information Trust Institute.  Visit http://www.icassp2006.org/SPCWinners.asp for more information on ICASSP or to read Kiyavash’s paper.


Share this story

This story was published January 1, 2005.