A generic collusion attack optimization strategy for traditional spread-spectrum and quantization index modulation fingerprinting

被引:1
作者
Feng, Hui [1 ]
Gan, Langxiong [2 ]
Ling, Hefei [3 ]
Zou, Fuhao [3 ]
Lu, Zhengding [3 ]
机构
[1] Wuhan Univ Technol, Sch Transportat, Key Lab High Performance Ship Technol, Minist Educ, Wuhan 430070, Hubei, Peoples R China
[2] Wuhan Univ Technol, Sch Nav, Hubei Key Lab Inland Shipping Technol, Wuhan 430070, Hubei, Peoples R China
[3] Huazhong Univ Sci & Technol, Coll Comp Sci, Wuhan 430074, Hubei, Peoples R China
关键词
Digital fingerprinting; Collusion attack; Optimization; Spread-spectrum; Quantization index modulation; DIGITAL WATERMARKING; MULTIMEDIA;
D O I
10.1007/s11042-014-1948-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Collusion attack is known to be a cost-effective attack against digital fingerprinting. Under the constraint that the fingerprint embedding algorithm and the host signal are unavailable to the adversaries, it is not very easy to perform efficient collusion attack. To solve this problem, we propose a generic collusion attack optimization (GCAO) strategy for traditional spread-spectrum (SS) and quantization index modulation (QIM) fingerprinting. First, we analyze the differential signal of two fingerprinted copies of the same content generated by popular fingerprint embedding algorithms, including both traditional SS-based embedder and QIM-based embedder. Based on the analysis of the differential signal, we construct a fingerprint forensic detector that identifies which embedder is applied and what the embedding parameters are adopted. Then, we improve the earlier proposed SANO collusion attack. Two components outlined above constitute a generic collusion attack optimization strategy. The simulation results show that the proposed forensic detector provides trustworthy performance: the detector can correctly identify the fingerprint embedding algorithm, and the probabilities of estimating the fingerprint length and position are higher than 86 % and 87 % for SS-based embedding and 84 % and 80 % for QIM-based embedding, respectively. The further experimental results illustrate that the proposed GCAO attack provides a better tradeoff between the probability of being undetected and the quality of the attacked copy.
引用
收藏
页码:6967 / 6988
页数:22
相关论文
共 33 条
[1]  
[Anonymous], 1996, 96045 NEC RES I
[2]  
[Anonymous], P ACM INT C MULT MM
[3]   A new decoder for the optimum recovery of nonadditive watermarks [J].
Barni, M ;
Bartolini, F ;
De Rosa, A ;
Piva, A .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (05) :755-766
[4]   Spatially adaptive wavelet thresholding with context modeling for image denoising [J].
Chang, SG ;
Yu, B ;
Vetterli, M .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (09) :1522-1531
[5]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[6]   An information-theoretic approach to the design of robust digital watermarking systems [J].
Chen, B ;
Wornell, GW .
ICASSP '99: 1999 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, PROCEEDINGS VOLS I-VI, 1999, :2061-2064
[7]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[8]   DE-NOISING BY SOFT-THRESHOLDING [J].
DONOHO, DL .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (03) :613-627
[9]   IDEAL SPATIAL ADAPTATION BY WAVELET SHRINKAGE [J].
DONOHO, DL ;
JOHNSTONE, IM .
BIOMETRIKA, 1994, 81 (03) :425-455
[10]   Quantization effects on digital watermarks [J].
Eggers, JJ ;
Girod, B .
SIGNAL PROCESSING, 2001, 81 (02) :239-263