Resistance analysis of scalable video fingerprinting systems under fair collusion attacks

被引:0
|
作者
Zhao, HV [1 ]
Liu, KJR [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digital rights when distributing multimedia over heterogeneous networks and studies the scalable multimedia fingerprinting systems in which users receive copies of different quality. We investigate the traitor tracing capability of such scalable fingerprinting systems, in particular, the robustness of the embedded fingerprints against multi-user collusion attacks. Under the fairness constraints on collusion that all attackers share the same risk of being captured, we analyze the maximum number of colluders that the fingerprinting systems can withstand, and our results show that multimedia fingerprints can survive collusion attacks by a few dozen colluders.
引用
收藏
页码:3457 / 3460
页数:4
相关论文
共 50 条
  • [31] Stability analysis on networked control systems under double attacks with predictive control
    Yang, Hongjiu
    Xu, Hao
    Xia, Yuanqing
    Zhang, Jinhui
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (04) : 1549 - 1563
  • [32] Vulnerability analysis of cyber physical systems under the false alarm cyber attacks
    Tu, Haicheng
    Xia, Yongxiang
    Chen, Xi
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 599
  • [33] Analysis of Stochastic Switched Systems With Application to Networked Control Under Jamming Attacks
    Cetinkaya, Ahmet
    Ishii, Hideaki
    Hayakawa, Tomohisa
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (05) : 2013 - 2028
  • [34] Survivability and Vulnerability Analysis of Cloud RAID Systems under Disk Faults and Attacks
    Liu, Qisi
    Xing, Liudong
    INTERNATIONAL JOURNAL OF MATHEMATICAL ENGINEERING AND MANAGEMENT SCIENCES, 2021, 6 (01) : 15 - 29
  • [35] Accurate modeling and efficient QoS analysis of scalable adaptive systems under bursty workload
    Perez-Palacin, Diego
    Mirandola, Raffaela
    Merseguer, Jose
    JOURNAL OF SYSTEMS AND SOFTWARE, 2017, 130 : 24 - 41
  • [36] Vulnerability analysis for a class of nonlinear cyber-physical systems under stealthy attacks
    Zhang, Qirui
    Dai, Wei
    Yang, Chunyu
    Chen, Xinkai
    AUTOMATICA, 2024, 167
  • [37] Security Analysis of Stochastic Networked Control Systems under False Data Injection Attacks
    Hu, Liang
    Wang, Zidong
    Naeem, Wasif
    2016 UKACC 11TH INTERNATIONAL CONFERENCE ON CONTROL (CONTROL), 2016,
  • [38] Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks
    Liu, Qi
    Liu, Tao
    Liu, Zihao
    Wang, Yanzhi
    Lin, Yier
    Wen, Wujie
    2018 23RD ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2018, : 721 - 726
  • [39] Protocol-Based Stability Analysis of Stochastic Hybrid Systems Under DoS Attacks
    Gao, Xiaobin
    Deng, Feiqi
    Zeng, Pengyu
    Liu, Xiaohua
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (10): : 6348 - 6358
  • [40] Stability Analysis for Cyber-Physical Systems Under Denial-of-Service Attacks
    Lu, An-Yang
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (11) : 5304 - 5313