Collusion of fingerprints via the gradient attack

被引:0
作者
Kirovski, D [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
来源
2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2 | 2005年
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The difficulty of building an effective digital rights management system stems from the fact that traditional cryptographic primitives such as encryption or scrambling do not protect audio or video signals once they are played in plain-text. This fact, commonly referred to as "the analog hole," has been responsible for the popularity of multimedia file sharing which cannot be controlled, at least technically, by content's copyright owners. In this paper, we explore a specific issue in multimedia fingerprinting as an answer to "the analog hole" problem. We analyze the collusion resistance of spread-spectrum fingerprints with an arbitrary probability distribution of their source using a recently introduced collusion procedure, the gradient attack.
引用
收藏
页码:2280 / 2284
页数:5
相关论文
共 7 条
  • [1] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
  • [2] KIROVSKI D, 2002, ACM MULTIMEDIA
  • [3] KIROVSKI D, 2003, IEEE T SIGN P
  • [4] A fair benchmark for image watermarking systems
    Kutter, M
    Petitcolas, FAP
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 : 226 - 239
  • [5] SCHONBERG D, 2004, ACM MULTIMEDIA
  • [6] van Trees H. L., 2002, Detection, estimation, and modulation theory, part I: detection, estimation, and linear modulation theory
  • [7] ZHAO H, 2003, IEEE ICASSP