A generic collusion attack optimization strategy for traditional spread-spectrum and quantization index modulation fingerprinting

被引:1
作者
Feng, Hui [1 ]
Gan, Langxiong [2 ]
Ling, Hefei [3 ]
Zou, Fuhao [3 ]
Lu, Zhengding [3 ]
机构
[1] Wuhan Univ Technol, Sch Transportat, Key Lab High Performance Ship Technol, Minist Educ, Wuhan 430070, Hubei, Peoples R China
[2] Wuhan Univ Technol, Sch Nav, Hubei Key Lab Inland Shipping Technol, Wuhan 430070, Hubei, Peoples R China
[3] Huazhong Univ Sci & Technol, Coll Comp Sci, Wuhan 430074, Hubei, Peoples R China
关键词
Digital fingerprinting; Collusion attack; Optimization; Spread-spectrum; Quantization index modulation; DIGITAL WATERMARKING; MULTIMEDIA;
D O I
10.1007/s11042-014-1948-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Collusion attack is known to be a cost-effective attack against digital fingerprinting. Under the constraint that the fingerprint embedding algorithm and the host signal are unavailable to the adversaries, it is not very easy to perform efficient collusion attack. To solve this problem, we propose a generic collusion attack optimization (GCAO) strategy for traditional spread-spectrum (SS) and quantization index modulation (QIM) fingerprinting. First, we analyze the differential signal of two fingerprinted copies of the same content generated by popular fingerprint embedding algorithms, including both traditional SS-based embedder and QIM-based embedder. Based on the analysis of the differential signal, we construct a fingerprint forensic detector that identifies which embedder is applied and what the embedding parameters are adopted. Then, we improve the earlier proposed SANO collusion attack. Two components outlined above constitute a generic collusion attack optimization strategy. The simulation results show that the proposed forensic detector provides trustworthy performance: the detector can correctly identify the fingerprint embedding algorithm, and the probabilities of estimating the fingerprint length and position are higher than 86 % and 87 % for SS-based embedding and 84 % and 80 % for QIM-based embedding, respectively. The further experimental results illustrate that the proposed GCAO attack provides a better tradeoff between the probability of being undetected and the quality of the attacked copy.
引用
收藏
页码:6967 / 6988
页数:22
相关论文
共 33 条
[11]   SVM-based anti-forensic method for spread-spectrum fingerprinting [J].
Feng, Hui ;
Ling, Hefei ;
Zou, Fuhao ;
Lu, Zhengding .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) :2624-2634
[12]   A collusion attack optimization framework toward spread-spectrum fingerprinting [J].
Feng, Hui ;
Ling, Hefei ;
Zou, Fuhao ;
Yan, Weiqi ;
Sarem, Mudar ;
Lu, Zhengding .
APPLIED SOFT COMPUTING, 2013, 13 (08) :3482-3493
[13]   A Collusion Attack Optimization Strategy for Digital Fingerprinting [J].
Feng, Hui ;
Ling, Hefei ;
Zou, Fuhao ;
Yan, Weiqi ;
Lu, Zhengding .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2012, 8 (02)
[14]  
He S, 2005, LECT NOTES COMPUT SC, V3710, P84
[15]   Joint coding and embedding techniques for multimedia fingerprinting [J].
He, Shan ;
Wu, Min .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (02) :231-247
[16]   Hiding digital watermarks using multiresolution wavelet transform [J].
Hsieh, MS ;
Tseng, DC ;
Huang, YH .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2001, 48 (05) :875-882
[17]  
Kirovski D, 2005, INT CONF ACOUST SPEE, P1037
[18]   A framework for optimizing nonlinear collusion attacks on fingerprinting systems [J].
Kiyavash, Negar ;
Moulin, Pierre .
2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, :1170-1175
[19]   Performance of Orthogonal Fingerprinting Codes Under Worst-Case Noise [J].
Kiyavash, Negar ;
Moulin, Pierre .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) :293-301
[20]   Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme [J].
Kuribayashi, Minoru ;
Kato, Hiroshi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) :670-680