A Novel Collusion Attack Strategy for Digital Fingerprinting

被引:0
作者
Ling, Hefei [1 ]
Feng, Hui [1 ]
Zou, Fuhao [1 ]
Yan, Weiqi [2 ]
Lu, Zhengding [1 ]
机构
[1] Huazhong Univ Sci Technol, Coll Comp Sci, Wuhan, Hubei, Peoples R China
[2] Queens Univ Belfast, Inst ECIT, Belfast BT7 1NN, Antrim, North Ireland
来源
DIGITAL WATERMARKING | 2011年 / 6526卷
关键词
Digital fingerprinting; collusion attack; optimization; Gaussian noise; WATERMARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital fingerprinting is a technology which aims to embed unique marks with traceability in order to identify users who use their multimedia content for unintended purpose. A cost-efficient attack against digital fingerprinting, known as collusion attack, involves a group of users who combine their fingerprinted content for the purpose of attenuating or removing the fingerprints. In this paper, we analyze and simulate the effect of Gaussian noise with different energies added in the noise-free forgery on both the detection performance of correlation-based detector and the perceptual quality of the attacked content. Based upon the analysis and the principal of informed watermark embedding, we propose a novel collusion attack strategy, self-adaptive noise optimization (SANO) collusion attack. The experimental results, under the assumption that orthogonal fingerprints are used, show that the proposed collusion attack performs more effectively than the most of existed collusion attacks. Less than three pieces of fingerprinted content can sufficiently interrupt orthogonal fingerprints which accommodate many thousands of users. Meanwhile, high fidelity of the attacked content is retained after the proposed collusion attack.
引用
收藏
页码:224 / +
页数:3
相关论文
共 50 条
[21]   Improvement of Collusion Secure Convolutional Fingerprinting Information Codes [J].
Tomas-Buliart, Joan ;
Fernandez, Marcel ;
Soriano, Miguel .
INFORMATION THEORETIC SECURITY, 2009, 4883 :76-88
[22]   A collusion attack on asymmetric group key exchange [J].
Teng, Jikai ;
Wu, Chuankun .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) :2189-2193
[23]   On the collusion-resistance of the fingerprinting algorithm based on additive watermarking [J].
Chen X. ;
Lian S. .
Journal of Multimedia, 2011, 6 (04) :369-375
[24]   An improved QIM based anti-collusion fingerprinting scheme [J].
Cheng, Geping ;
Ling, Hefei ;
Zou, Fuhao ;
Li, Ping .
2010 IEEE 10TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS (ICSP2010), VOLS I-III, 2010, :1865-1868
[25]   Analysis of nonlinear collusion attacks on fingerprinting systems for compressed multimedia [J].
Varna, Avinash L. ;
He, Shan ;
Swaminathan, Ashwin ;
Wu, Min .
2007 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-7, 2007, :697-700
[26]   On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting [J].
Cheng, Minquan ;
Miao, Ying .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (07) :4843-4851
[27]   On the capacity game of private fingerprinting systems under collusion attacks [J].
Somekh-Baruch, A ;
Merhav, N .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (03) :884-899
[28]   Collusion-Resilient Privacy-Preserving Database Fingerprinting [J].
Zhang, Shunsheng ;
Zhu, Youwen ;
Zeng, Ao .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :8306-8321
[29]   Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video [J].
Abdelhedi, Karama ;
Chaabane, Faten ;
Puech, William ;
Ben Amar, Chokri .
COMPUTER ANALYSIS OF IMAGES AND PATTERNS, CAIP 2021, PT 1, 2021, 13052 :58-68
[30]   Malware Collusion Attack against SVM: Issues and Countermeasures [J].
Chen, Hongyi ;
Su, Jinshu ;
Qiao, Linbo ;
Xin, Qin .
APPLIED SCIENCES-BASEL, 2018, 8 (10)