Collusion attack to a scalable AND-ACC fingerprinting scheme

被引:0
|
作者
Wu, Yongdong [1 ]
Zhao, Zhigang [1 ]
机构
[1] Inst Infocomm Res, Syst & Secur Dept, Singapore, Singapore
来源
VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2007, PTS 1 AND 2 | 2007年 / 6508卷
关键词
scalable AND-ACC fingerprinting; linear combination collusion Attack(LCCA); watermarking; collusion attack;
D O I
10.1117/12.706726
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
This paper presents a collusion attack to a fingerprinting scheme. To this end, It creates a pirated copy by adaptively separating the traitors into groups and then applying either LCCA or majority attack. Since the pirated copy discloses no watermarks of the traitors, the fingerprinting scheme fails to trace the traitors. Our experiments demonstrate that the attack is effective.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
  • [22] A Performance Evaluation of Collusion Attacks in Multimedia Fingerprinting
    Feng, Hui
    Ling, Hefei
    Zou, Fuhao
    Lu, Zhengding
    Chen, Jiazhong
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 530 - 534
  • [23] Collusion Attack Detection in Networked Systems
    Bhuiyan, Md Zakirul Alam
    Wu, Jie
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 286 - 293
  • [24] Android collusion attack detection model
    Yang H.
    Wang Z.
    2018, Editorial Board of Journal on Communications (39): : 27 - 36
  • [25] Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing Against Collusion Attack
    Lu, Zhaobo
    Wang, Jin
    Zhou, Jingya
    Wang, Jianping
    Lu, Kejie
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT I, 2022, 13155 : 529 - 548
  • [26] Attacks on Kuribayashi's Fingerprinting Scheme
    Schaathun, Hans Georg
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) : 607 - 609
  • [27] A collusion attack on asymmetric group key exchange
    Teng, Jikai
    Wu, Chuankun
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2189 - 2193
  • [28] Cryptographic methods for collusion-secure fingerprinting of digital data
    Biehl, I
    Meyer, B
    COMPUTERS & ELECTRICAL ENGINEERING, 2002, 28 (01) : 59 - 75
  • [29] On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting
    Cheng, Minquan
    Miao, Ying
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (07) : 4843 - 4851
  • [30] On the capacity game of private fingerprinting systems under collusion attacks
    Somekh-Baruch, A
    Merhav, N
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (03) : 884 - 899