Collusion-resistant Fingerprinting of Parallel Content Channels

被引:0
作者
Joudeh, Basheer [1 ]
Skoric, Boris [1 ]
机构
[1] Eindhoven Univ Technol, Eindhoven, Netherlands
来源
PROCEEDINGS OF THE 2022 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH-MMSEC 2022 | 2022年
关键词
watermarking; traitor tracing; collusion attack; information theoretic security; TARDOS CODES;
D O I
10.1145/3531536.3532953
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The fingerprinting game is analysed when the coalition size.. is known to the tracer, but the colluders can distribute themselves across L TV channels. The collusion channel is introduced and the extra degrees of freedom for the coalition are made manifest in our formulation. We introduce a payoff functional that is analogous to the single TV channel case, and is conjectured to be closely related to the fingerprinting capacity. For the binary alphabet case under the marking assumption, and the restriction of access to one TV channel per person per segment, we derive the asymptotic behavior of the payoff functional. We find that the value of the maximin game for our payoff is asymptotically equal to L-2/k(2)2 ln 2, with optimal strategy for the tracer being the arcsine distribution, and for the coalition being the interleaving attack across all TV channels, as well as assigning an equal number of colluders across the L TV channels.
引用
收藏
页码:81 / 89
页数:9
相关论文
共 50 条
  • [21] A collusion attack optimization framework toward spread-spectrum fingerprinting
    Feng, Hui
    Ling, Hefei
    Zou, Fuhao
    Yan, Weiqi
    Sarem, Mudar
    Lu, Zhengding
    APPLIED SOFT COMPUTING, 2013, 13 (08) : 3482 - 3493
  • [22] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
  • [23] Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
    Zhao, HV
    Wu, M
    Wang, ZJ
    Liu, KJR
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (05) : 646 - 661
  • [24] Content adaptive watermarking for multimedia fingerprinting
    Lin, Yu-Tzu
    Wu, Ja-Ling
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (05) : 271 - 287
  • [25] Cryptographic methods for collusion-secure fingerprinting of digital data
    Biehl, I
    Meyer, B
    COMPUTERS & ELECTRICAL ENGINEERING, 2002, 28 (01) : 59 - 75
  • [26] Collusion-resilient fingerprinting by random pre-warping
    Celik, MU
    Sharma, G
    Tekalp, AM
    IEEE SIGNAL PROCESSING LETTERS, 2004, 11 (10) : 831 - 835
  • [27] On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting
    Cheng, Minquan
    Miao, Ying
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (07) : 4843 - 4851
  • [28] On the capacity game of private fingerprinting systems under collusion attacks
    Somekh-Baruch, A
    Merhav, N
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (03) : 884 - 899
  • [29] Error- and collusion-secure fingerprinting for digital data
    Guth, HJ
    Pfitzmann, B
    INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 134 - 145
  • [30] Collusion-Resilient Privacy-Preserving Database Fingerprinting
    Zhang, Shunsheng
    Zhu, Youwen
    Zeng, Ao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8306 - 8321