A Novel Collusion Attack Strategy for Digital Fingerprinting

被引:0
作者
Ling, Hefei [1 ]
Feng, Hui [1 ]
Zou, Fuhao [1 ]
Yan, Weiqi [2 ]
Lu, Zhengding [1 ]
机构
[1] Huazhong Univ Sci Technol, Coll Comp Sci, Wuhan, Hubei, Peoples R China
[2] Queens Univ Belfast, Inst ECIT, Belfast BT7 1NN, Antrim, North Ireland
来源
DIGITAL WATERMARKING | 2011年 / 6526卷
关键词
Digital fingerprinting; collusion attack; optimization; Gaussian noise; WATERMARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital fingerprinting is a technology which aims to embed unique marks with traceability in order to identify users who use their multimedia content for unintended purpose. A cost-efficient attack against digital fingerprinting, known as collusion attack, involves a group of users who combine their fingerprinted content for the purpose of attenuating or removing the fingerprints. In this paper, we analyze and simulate the effect of Gaussian noise with different energies added in the noise-free forgery on both the detection performance of correlation-based detector and the perceptual quality of the attacked content. Based upon the analysis and the principal of informed watermark embedding, we propose a novel collusion attack strategy, self-adaptive noise optimization (SANO) collusion attack. The experimental results, under the assumption that orthogonal fingerprints are used, show that the proposed collusion attack performs more effectively than the most of existed collusion attacks. Less than three pieces of fingerprinted content can sufficiently interrupt orthogonal fingerprints which accommodate many thousands of users. Meanwhile, high fidelity of the attacked content is retained after the proposed collusion attack.
引用
收藏
页码:224 / +
页数:3
相关论文
共 50 条
  • [21] A Novel Collusion Combination Cyberattack Strategy Against Integrated Energy System
    Zhang, YunNing
    Tu, Xun
    Fu, WenLong
    Gao, YiHeng
    Chen, Xi
    Zhang, Lei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (11) : 12669 - 12683
  • [22] A collusion attack on asymmetric group key exchange
    Teng, Jikai
    Wu, Chuankun
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2189 - 2193
  • [23] An improved QIM based anti-collusion fingerprinting scheme
    Cheng, Geping
    Ling, Hefei
    Zou, Fuhao
    Li, Ping
    2010 IEEE 10TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS (ICSP2010), VOLS I-III, 2010, : 1865 - 1868
  • [24] On the collusion-resistance of the fingerprinting algorithm based on additive watermarking
    Chen X.
    Lian S.
    Journal of Multimedia, 2011, 6 (04): : 369 - 375
  • [25] On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting
    Cheng, Minquan
    Miao, Ying
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (07) : 4843 - 4851
  • [26] On the capacity game of private fingerprinting systems under collusion attacks
    Somekh-Baruch, A
    Merhav, N
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (03) : 884 - 899
  • [27] Analysis of nonlinear collusion attacks on fingerprinting systems for compressed multimedia
    Varna, Avinash L.
    He, Shan
    Swaminathan, Ashwin
    Wu, Min
    2007 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-7, 2007, : 697 - 700
  • [28] Collusion-Resilient Privacy-Preserving Database Fingerprinting
    Zhang, Shunsheng
    Zhu, Youwen
    Zeng, Ao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8306 - 8321
  • [29] Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video
    Abdelhedi, Karama
    Chaabane, Faten
    Puech, William
    Ben Amar, Chokri
    COMPUTER ANALYSIS OF IMAGES AND PATTERNS, CAIP 2021, PT 1, 2021, 13052 : 58 - 68
  • [30] Malware Collusion Attack against SVM: Issues and Countermeasures
    Chen, Hongyi
    Su, Jinshu
    Qiao, Linbo
    Xin, Qin
    APPLIED SCIENCES-BASEL, 2018, 8 (10):