Collusion attack to a scalable AND-ACC fingerprinting scheme

被引:0
作者
Wu, Yongdong [1 ]
Zhao, Zhigang [1 ]
机构
[1] Inst Infocomm Res, Syst & Secur Dept, Singapore, Singapore
来源
VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2007, PTS 1 AND 2 | 2007年 / 6508卷
关键词
scalable AND-ACC fingerprinting; linear combination collusion Attack(LCCA); watermarking; collusion attack;
D O I
10.1117/12.706726
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
This paper presents a collusion attack to a fingerprinting scheme. To this end, It creates a pirated copy by adaptively separating the traitors into groups and then applying either LCCA or majority attack. Since the pirated copy discloses no watermarks of the traitors, the fingerprinting scheme fails to trace the traitors. Our experiments demonstrate that the attack is effective.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Improved versions of Tardos' fingerprinting scheme
    Blayer, Oded
    Tassa, Tamir
    DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (01) : 79 - 103
  • [42] A random-error-resilient collusion-secure fingerprinting code, randomized c-secure CRT code
    Watanabe, H
    Kitagawa, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (10) : 2589 - 2595
  • [43] Probabilistic Fingerprinting Scheme for Correlated Data
    Yilmaz, Emre
    Ayday, Erman
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVII, DBSEC 2023, 2023, 13942 : 69 - 90
  • [44] CASL: A Novel Collusion Attack Against Distributed Energy Management Systems
    Ye, Feng
    Cao, Xianghui
    Cheng, Zheyuan
    Chow, Mo-Yuen
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (06) : 4717 - 4728
  • [45] Robustness Evaluation of Spread-Spectrum Watermarking Against Collusion Attack
    Sakai, Yasuhiro
    Mimura, Kazushi
    JOURNAL OF THE PHYSICAL SOCIETY OF JAPAN, 2012, 81 (03)
  • [46] Server-aided RSA key generation against collusion attack
    Chen, Yun
    Safavi-Naini, Reihaneh
    Baek, Joonsang
    Chen, Xin
    SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 27 - 37
  • [47] A collusion-resistant dynamic key management scheme for WSNs
    Zhan, Furui
    Yao, Nianmin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6351 - 6364
  • [48] A simple fingerprinting scheme for large user groups
    Hu, Defa
    Li, Qiaoliang
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (02): : 163 - 168
  • [49] Design and analysis of a scalable watermarking scheme for the scalable audio coder
    Li, Zhi
    Sun, Qibin
    Lian, Yong
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (08) : 3064 - 3077
  • [50] Malware Collusion Attack Against Machine Learning Based Methods: Issues and Countermeasures
    Chen, Hongyi
    Su, Jinshu
    Qiao, Linbo
    Zhang, Yi
    Xin, Qin
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 465 - 477