On the collusion-resistance of the fingerprinting algorithm based on additive watermarking

被引:1
作者
Chen X. [1 ]
Lian S. [2 ]
机构
[1] Management School, Nanjing University, Nanjing
[2] Corporate Research, Huawei Technologies, Beijing
关键词
Additive watermarking; Collusion resistance; Digital fingerprinting; Security in digital systems;
D O I
10.4304/jmm.6.4.369-375
中图分类号
学科分类号
摘要
Digital fingerprinting is the technique used for traitor tracing in multimedia content distribution. It embeds unique customer information (e.g., customer ID) into multimedia content and generates different copies for different customers. The unique customer information can be extracted from the illegal copy and used to tell the traitor who re-distributes his copy to other unauthorized customers. Till now, there exist some fingerprint embedding algorithms, such as additive embedding, multiplicative embedding, quantization embedding, etc. However, the ability to resist collusion attacks is not studied. Collusion attack is the biggest threat to fingerprinting algorithms, which combines several copies together to produce a new copy without customer information. In this paper, the fingerprinting algorithm based on additive embedding is considered, its robustness against various collusion attacks are analyzed. The theoretical results are given, together with some simulation results. As is shown, the considered fingerprinting algorithm is robust against some of the collusion attacks, while becomes fragile to some other collusion attacks with the rise of the number of colluders. It is expected to provide some advices to design or analyze fingerprinting algorithms. © 2011 ACADEMY PUBLISHER.
引用
收藏
页码:369 / 375
页数:6
相关论文
共 18 条
[1]  
Lin E.I., Eskicioglu A.M., Lagendijk R.L., Delp E.J., Advances in digital video content protection, Proceedings of the IEEE, 93, 1, pp. 171-183, (2005)
[2]  
Cox I.J., Miller M.L., Bloom J.A., Digital Watermarking, Morgan-Kaufmann, San Francisco, (2002)
[3]  
Barni M., Bartolini F., Watermark Systems Engineering, Marcel Dekker, (2004)
[4]  
Cox I., Kilian J., Leighton F., Shamoon F., Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, 6, 12, pp. 1673-1687, (1997)
[5]  
Barni M., Bartolini F., Cappellini V., Piva A., Robust Watermarking of Still Images for Copyright protection, 13th International Conference on Digital Signal Processing, Santorini Greece, 2, pp. 499-502, (1997)
[6]  
Eggers J., Grid B., Quantization Watermarking, Proceedings of SPIE, 3971, pp. 1-12, (2000)
[7]  
Boneh D., Shaw J., Collusion-secure fingerprinting for digital data, IEEE Trans. Inform. Theory, 44, pp. 1897-1905, (1998)
[8]  
Kim W., Suh Y., Short N-secure fingerprinting code for image, 2004 International Conference on Image Processing (ICIP2004), pp. 2167-2170, (2004)
[9]  
Wu Y., Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting, IEEE International Conference on Acoustics, Speech, and Signal Processing, 2, pp. 13-16, (2005)
[10]  
Lemma A.N., Katzenbeisser S., Celik M.U., Veen M.V., Secure Watermark Embedding Through Partial Encryption, Proceedings of International Workshop on Digital Watermarking (IWDW 2006), Springer LNCS, 4283, pp. 433-445, (2006)