Regular Simplex Fingerprints and Their Optimality Properties

被引:11
作者
Kiyavash, Negar [1 ,2 ]
Moulin, Pierre [1 ,3 ]
Kalker, Ton [4 ]
机构
[1] Univ Illinois, Coordinated Sci Lab, Beckman Inst, Urbana, IL 61801 USA
[2] Univ Illinois, Dept Ind & Enterprise Syst Engn, Urbana, IL 61801 USA
[3] Univ Illinois, Dept Elect & Comp Engn, Urbana, IL 61801 USA
[4] Multimedia Commun & Networking Dept, Hewlett Packard Labs, Palo Alto, CA 94305 USA
基金
美国国家科学基金会;
关键词
Collusion attacks; fingerprinting; signal detection; simplex codes;
D O I
10.1109/TIFS.2009.2025855
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper addresses the design of additive fingerprints that are maximally resilient against linear collusion attacks on a focused correlation detector, as defined below. Let N be the length of the host vector and M <= N + 1 the number of users. The focused detector performs a correlation test in order to decide whether a user of interest is among the colluders. Both the fingerprint embedder and the colluders are subject to squared-error distortion constraints. We show that simplex fingerprints maximize a geometric figure of merit for this detector. In that sense they outperform orthogonal fingerprints but the advantage vanishes asM -> infinity. They are also optimal in terms of minimizing the probability of error of the focused detector when the attack is a uniform averaging of the marked copies followed by the addition of white Gaussian noise. Reliable detection is guaranteed provided that the number of colluders K << root N. Moreover, we study the probability of error performance of simplex fingerprints for the focused correlation detector when the colluders use nonuniform averaging plus white Gaussian noise attacks.
引用
收藏
页码:318 / 329
页数:12
相关论文
共 16 条
[1]  
[Anonymous], P C INF SCI SYST CIS
[2]  
BLAHUT R, INTRO TELEC IN PRESS
[3]  
Boneh D, 1995, LECT NOTES COMPUT SC, V963, P452
[4]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[5]  
Cox IJ, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P243, DOI 10.1109/ICIP.1996.560429
[6]  
Ergun F., 1999, EUROCRYPT'99, P140
[7]   MULTIDIMENSIONAL CONSTELLATIONS .1. INTRODUCTION, FIGURES OF MERIT, AND GENERALIZED CROSS CONSTELLATIONS [J].
FORNEY, GD ;
WEI, LF .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1989, 7 (06) :877-892
[8]  
Hocking John Gilbert, 1988, Topology
[9]  
Kilian J, 1998, 1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, P271
[10]  
KIYAVASH N, IEEE INF FORENSICS S, DOI DOI 10.1109/TIFS.2009.2026462