Analysis of nonlinear collusion attacks on fingerprinting systems for compressed multimedia

被引:0
|
作者
Varna, Avinash L. [1 ]
He, Shan [1 ]
Swaminathan, Ashwin [1 ]
Wu, Min [1 ]
机构
[1] Univ Maryland, ECE Dept, College Pk, MD 20742 USA
关键词
digital fingerprinting; collusion resistance; compressed signals; anti-collusion dither;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we analyze the effect of various collusion attacks on fingerprinting systems for compressed multimedia. We evaluate the effectiveness of the collusion attacks in terms of the probability of detection and accuracy in estimating the host signal. Our analysis shows that applying averaging collusion on copies of moderately compressed content gives a highly accurate estimation of the host, and can effectively remove the embedded fingerprints. Averaging is thus the best choice for an attacker as the probability of detection and the distortion introduced are the lowest.
引用
收藏
页码:697 / 700
页数:4
相关论文
共 50 条
  • [41] Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
    Rehman, Saeed Ur
    Sowerby, Kevin W.
    Coghill, Colin
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 591 - 601
  • [42] Static Detection of Collusion Attacks in ARBAC-based Workflow Systems
    Calzavara, Stefano
    Rabitti, Alvise
    Steffinlongo, Enrico
    Bugliesi, Michele
    2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, : 458 - 470
  • [43] Distance bounding protocols: Authentication logic analysis and collusion attacks
    Meadows, Catherine
    Poovendran, Radha
    Pavlovic, Dusko
    Chang, LiWu
    Syverson, Paul
    SECURE LOCALIZATION AND TIME SYNCHRONIZATION FOR WIRELESS SENSOR AND AD HOC NETWORKS, 2007, 30 : 279 - +
  • [44] Anti-collusion fingerprinting scheme based on error correction ability of nonlinear combinatorial code
    Huang, Wanjun
    Panahi, Issa M. S.
    WIRELESS SENSING AND PROCESSING II, 2007, 6577
  • [45] Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks
    Liu, Qi
    Liu, Tao
    Liu, Zihao
    Wang, Yanzhi
    Lin, Yier
    Wen, Wujie
    2018 23RD ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2018, : 721 - 726
  • [46] Discovering Hackers by Stealth: Predicting Fingerprinting Attacks on Honeypot Systems
    Naik, Nitin
    Jenkins, Paul
    2018 4TH IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (ISSE), 2018,
  • [47] Attacks and forensic analysis for multimedia content protection
    Jin, HX
    Lotspiech, J
    2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 1393 - 1396
  • [48] Blockchain-based P2P multimedia content distribution using collusion-resistant fingerprinting
    Qureshi, Amna
    Megias, David
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1606 - 1615
  • [49] Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting
    Megias, David
    Qureshi, Amna
    EXPERT SYSTEMS WITH APPLICATIONS, 2017, 71 : 147 - 172
  • [50] A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
    Jaimez, Marc
    Esparza, Oscar
    Munoz, Jose L.
    Alins-Delgado, Juan J.
    Mata-Diaz, Jorge
    INFORMATION SECURITY THEORY AND PRACTICE: SMART DEVICES, PERVASIVE SYSTEMS, AND UBIQUITOUS NETWORKS, PROCEEDINGS, 2009, 5746 : 12 - 27