Resistance analysis of scalable video fingerprinting systems under fair collusion attacks

被引:0
|
作者
Zhao, HV [1 ]
Liu, KJR [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digital rights when distributing multimedia over heterogeneous networks and studies the scalable multimedia fingerprinting systems in which users receive copies of different quality. We investigate the traitor tracing capability of such scalable fingerprinting systems, in particular, the robustness of the embedded fingerprints against multi-user collusion attacks. Under the fairness constraints on collusion that all attackers share the same risk of being captured, we analyze the maximum number of colluders that the fingerprinting systems can withstand, and our results show that multimedia fingerprints can survive collusion attacks by a few dozen colluders.
引用
收藏
页码:3457 / 3460
页数:4
相关论文
共 50 条
  • [1] Fair collusion attacks on scalable viideo fingerprinting systems
    Zhao, HV
    Liu, KJR
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 1045 - 1048
  • [2] Collusion secure scalable video fingerprinting scheme
    Shashanka, D.
    Bora, P. K.
    ADCOM 2007: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2007, : 641 - 647
  • [3] On the capacity game of private fingerprinting systems under collusion attacks
    Somekh-Baruch, A
    Merhav, N
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 191 - 191
  • [4] On the capacity game of private fingerprinting systems under collusion attacks
    Somekh-Baruch, A
    Merhav, N
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (03) : 884 - 899
  • [5] Analysis of nonlinear collusion attacks on fingerprinting systems for compressed multimedia
    Varna, Avinash L.
    He, Shan
    Swaminathan, Ashwin
    Wu, Min
    2007 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-7, 2007, : 697 - 700
  • [6] Attacks on collusion-secure fingerprinting for multicast video protocols
    Baaziz, N
    Sami, Y
    DFMA '05: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS FOR MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2004, : 210 - 216
  • [7] A framework for optimizing nonlinear collusion attacks on fingerprinting systems
    Kiyavash, Negar
    Moulin, Pierre
    2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 1170 - 1175
  • [8] Analysis of Time-Varying Collusion Attacks in Fingerprinting Systems: Capacity and Throughput
    Cha, Byung-Ho
    Kuo, C. -C. Jay
    ISCAS: 2009 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-5, 2009, : 493 - +
  • [9] Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
    Zhao, HV
    Wu, M
    Wang, ZJ
    Liu, KJR
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (05) : 646 - 661
  • [10] On the Capacity Game of Private Fingerprinting Systems Under Collusion Attacks (vol 51, pg 884, 2005)
    Somekh-Baruch, Anelia
    Merhav, Neri
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (11) : 5263 - 5264