Collusion attack to a scalable AND-ACC fingerprinting scheme

被引:0
|
作者
Wu, Yongdong [1 ]
Zhao, Zhigang [1 ]
机构
[1] Inst Infocomm Res, Syst & Secur Dept, Singapore, Singapore
来源
VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2007, PTS 1 AND 2 | 2007年 / 6508卷
关键词
scalable AND-ACC fingerprinting; linear combination collusion Attack(LCCA); watermarking; collusion attack;
D O I
10.1117/12.706726
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
This paper presents a collusion attack to a fingerprinting scheme. To this end, It creates a pirated copy by adaptively separating the traitors into groups and then applying either LCCA or majority attack. Since the pirated copy discloses no watermarks of the traitors, the fingerprinting scheme fails to trace the traitors. Our experiments demonstrate that the attack is effective.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Collusion-Resilient Privacy-Preserving Database Fingerprinting
    Zhang, Shunsheng
    Zhu, Youwen
    Zeng, Ao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8306 - 8321
  • [32] Error- and collusion-secure fingerprinting for digital data
    Guth, HJ
    Pfitzmann, B
    INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 134 - 145
  • [33] Malware Collusion Attack against SVM: Issues and Countermeasures
    Chen, Hongyi
    Su, Jinshu
    Qiao, Linbo
    Xin, Qin
    APPLIED SCIENCES-BASEL, 2018, 8 (10):
  • [34] A Novel Method to Reduce Collusion Attack Possibility on Watermarking
    Boroujerdizadeh, A.
    Ghobadi, A. R.
    Yaribakht, A. H.
    Bin Abdoullah, M. Shahidan
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1066 - 1071
  • [35] RISK-DISTORTION ANALYSIS FOR VIDEO COLLUSION ATTACK
    Chen, Yan
    Lin, W. Sabrina
    Liu, K. J. Ray
    2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, : 1441 - 1444
  • [36] Collusion Attack Analysis and Detection of DPoS Consensus Mechanism
    Qi, Xinxin
    Fu, Xiaodong
    Dai, Fei
    Liu, Li
    Liu, Lijun
    Ding, Jiaman
    Peng, Wei
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2022, 2022, 1679 : 194 - 206
  • [37] Detecting and preventing collusion attack in DPoS based on power index
    Fu X.
    Qi X.
    Liu L.
    Peng W.
    Ding J.
    Dai F.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (12): : 123 - 133
  • [38] Collusion Attack Resilient 3D Mesh Watermarking Based on Anti-Collusion Fingerprint Code
    Hou, Jong-Uk
    Yu, In-Jae
    Lee, Heung-Kyu
    APPLIED SCIENCES-BASEL, 2018, 8 (07):
  • [39] Bandwidth efficient asymmetric fingerprinting scheme
    Hu, Defa
    Li, Qiaoliang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (02) : 84 - 91
  • [40] Improved versions of Tardos’ fingerprinting scheme
    Oded Blayer
    Tamir Tassa
    Designs, Codes and Cryptography, 2008, 48 : 79 - 103