Resistance analysis of scalable video fingerprinting systems under fair collusion attacks

被引:0
|
作者
Zhao, HV [1 ]
Liu, KJR [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digital rights when distributing multimedia over heterogeneous networks and studies the scalable multimedia fingerprinting systems in which users receive copies of different quality. We investigate the traitor tracing capability of such scalable fingerprinting systems, in particular, the robustness of the embedded fingerprints against multi-user collusion attacks. Under the fairness constraints on collusion that all attackers share the same risk of being captured, we analyze the maximum number of colluders that the fingerprinting systems can withstand, and our results show that multimedia fingerprints can survive collusion attacks by a few dozen colluders.
引用
收藏
页码:3457 / 3460
页数:4
相关论文
共 50 条
  • [41] Performance limitation analysis of networked control systems under denial-of-service attacks
    Cheng, LingLi
    Yan, Huaicheng
    Zhan, Xisheng
    Wang, Meng
    Shi, Kaibo
    ASIAN JOURNAL OF CONTROL, 2022, 24 (05) : 2689 - 2701
  • [42] Security Analysis of Discrete Nonlinear Systems With Injection Attacks Under Iterative Learning Schemes
    Xiong, Wenjun
    Gong, Kai
    Wen, Guanghui
    Lu, Jinhu
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (02): : 927 - 935
  • [43] Performance Analysis of GNSS/INS Loosely Coupled Integration Systems under Spoofing Attacks
    Xu, Rui
    Ding, Mengyu
    Qi, Ya
    Yue, Shuai
    Liu, Jianye
    SENSORS, 2018, 18 (12)
  • [44] Security analysis for cyber-physical systems under undetectable attacks: A geometric approach
    Zhao, Zhengen
    Yang, Ying
    Li, Yuzhe
    Liu, Ruijie
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4359 - 4370
  • [45] Reachability Analysis for Linear Discrete-Time Systems Under Stealthy Cyber Attacks
    Liu, Hao
    Niu, Ben
    Qin, Jiahu
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (09) : 4444 - 4451
  • [46] Stability analysis of distributed convex optimization under persistent attacks: A hybrid systems approach
    Wang, Xue-Fang
    Teel, Andrew R.
    Liu, Kun-Zhi
    Sun, Xi-Ming
    AUTOMATICA, 2020, 111 (111)
  • [47] Channel Aware Multiuser Scalable Video Streaming Over Lossy Under-Provisioned Channels: Modeling and Analysis
    Mansour, Hassan
    Krishnamurthy, Vikram
    Nasiopoulos, Panos
    IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (07) : 1366 - 1381
  • [48] Stability analysis of token-based wireless networked control systems under deception attacks
    Du, Dajun
    Zhang, Changda
    Wang, Haikuan
    Li, Xue
    Hu, Huosheng
    Yang, Taicheng
    INFORMATION SCIENCES, 2018, 459 : 168 - 182
  • [49] Vulnerability Analysis of Cyber Physical Systems under False-Data Injection and Disturbance Attacks
    Gerard, Benjamin
    Rebai, Souad Bezzaoucha
    Voos, Holger
    Darouach, Mohamed
    2018 IEEE 23RD INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2018, : 1023 - 1030
  • [50] Analysis of trust-based E-commerce recommender systems under recommendation attacks
    Zhang Fu-guo
    Xu Sheng-hua
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 385 - 390