A note on the limits of collusion-resistant watermarks

被引:0
作者
Ergun, F
Kilian, J
Kumar, R
机构
[1] Bell Labs, Murray Hill, NJ 07974 USA
[2] NEC Res Inst, Princeton, NJ 08540 USA
[3] IBM Almaden Res Ctr, K53C, San Jose, CA 95120 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT'99 | 1999年 / 1592卷
关键词
watermarking; intellectual property protection; collusion resistance;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In one proposed use of digital watermarks, the owner of a document D sells slightly different documents, D-1,D-2,... to each buyer; if a buyer posts his/her document D-i to the web, the owner can identify the source of the leak. More general attacks are however possible in which k buyers create some composite document D*; the goal of the owner is to identify at least one of the conspirators. We show, for a reasonable model of digital watermarks, fundamental limits on their efficacy against collusive attacks. In particular, if the effective document length is n, then at most O(rootn/lnn) adversaries can defeat any watermarking scheme. Our attack is, in the theoretical model, oblivious to the watermarking scheme being used; in practice, it uses very little information about the watermarking scheme. Thus, using a proprietary system seems to give only a very weak defense.
引用
收藏
页码:140 / 149
页数:10
相关论文
共 10 条
[1]  
[Anonymous], 1994, LNCS
[2]  
[Anonymous], LNCS
[3]  
Boneh D, 1995, LECT NOTES COMPUT SC, V963, P452
[4]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[5]  
Dwork C., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P489, DOI 10.1145/237814.237997
[6]  
KILIAN J, 1998, TR58598 PRINC U DEP
[7]  
Naor M, 1998, LECT NOTES COMPUT SC, V1462, P502, DOI 10.1007/BFb0055750
[8]  
Pfitzmann B, 1996, LECT NOTES COMPUT SC, V1070, P84
[9]  
PFITZMANN B, 1996, LECT NOTES COMPUTER, V1174, P49
[10]  
PFITZMANN B, 1997, P 4 ACM C COMP COMM, P151