A Collusion Attack Optimization Strategy for Digital Fingerprinting

被引:6
作者
Feng, Hui [1 ]
Ling, Hefei [1 ]
Zou, Fuhao [1 ]
Yan, Weiqi [2 ]
Lu, Zhengding [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci, Wuhan 430074, Peoples R China
[2] Queens Univ Belfast, Inst ECIT, Belfast BT7 1NN, Antrim, North Ireland
关键词
Algorithms; Design; Security; Multimedia security; digital fingerprinting; collusion attack; optimization;
D O I
10.1145/2344436.2344442
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Collusion attack is a cost-efficient attack for digital fingerprinting. In this article, we propose a novel collusion attack strategy, Iterative Optimization Collusion Attack (IOCA), which is based upon the gradient attack and the principle of informed watermark embedding. We evaluate the performance of the proposed collusion attack strategy in defeating four typical fingerprinting schemes under a well-constructed evaluation framework. The simulation results show that the proposed strategy performs more effectively than the gradient attack, and adopting no more than three fingerprinted copies can sufficiently collapse examined fingerprinting schemes. Meanwhile, the content resulted from the proposed attack still preserves high perceptual quality.
引用
收藏
页数:20
相关论文
共 35 条
[1]  
[Anonymous], EURASIP J APPL SIGNA
[2]  
[Anonymous], 2009, GROUND TRUTH DAT
[3]  
[Anonymous], EUR SIGN PROC C EUSI
[4]  
[Anonymous], 2009, USC SIPI IM DAT
[5]  
[Anonymous], P ACM INT C MULT MM
[6]  
[Anonymous], P ACM INT C MULT MM
[7]   Collusion-secure fingerprinting for digital data [J].
Boneh, D ;
Shaw, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :1897-1905
[8]   Collusion-resilient fingerprinting by random pre-warping [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM .
IEEE SIGNAL PROCESSING LETTERS, 2004, 11 (10) :831-835
[9]   Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks [J].
Cha, Byung-Ho ;
Kuo, C. -C. Jay .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) :302-317
[10]   Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game [J].
Chen, Yan ;
Lin, W. Sabrina ;
Liu, K. J. Ray .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2010, 19 (07) :1798-1807