On the capacity game of private fingerprinting systems under collusion attacks

被引:27
作者
Somekh-Baruch, A [1 ]
Merhav, N [1 ]
机构
[1] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
关键词
capacity; coding with side information; error exponents; fingerprinting; information hiding; maximum mutual information (MMI) decoder; private watermarking; randomized code; steganography; universal decoding; watermarking;
D O I
10.1109/TIT.2004.842702
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of fingerprinting in the presence of collusive attacks is considered. It is modeled as a game between a fingerprinter and a decoder on the one hand, and a coalition of two or more attackers on the other. The fingerprinter distributes, to different users, different fingerprinted copies of a host data (covertext) embedded with different fingerprints. The coalition members create a forgery of the data while aiming at erasing the fingerprints in order not to be detected. Their action is modeled by a multiple-access channel (MAC). The decoder, who has access to the original covertext data, observes the forgery and decodes one of the messages in order to identify one of the members of the coalition. Motivated by a worst case approach, we assume that the coalition of attackers is informed of the hiding strategy taken by the fingerprinter and the decoder, while they are uninformed of the attacking scheme. A single-letter expression for the capacity is derived under the assumption that the host data is drawn from a memoryless; stationary source and some mild assumptions on the operation of the encoder. It is shown that for a coalition consisting of L < infinity members, the capacity scales with O(1/L), and whenever L grows with the length of the covertext, the capacity is essentially zero. Also, a lower bound on the error exponent is derived as a by-product of the achievability part, and asymptotically optimum strategies of the parties involved are characterized.
引用
收藏
页码:884 / 899
页数:16
相关论文
共 25 条
[1]  
Barg A., 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252), DOI 10.1109/ISIT.2001.936024
[2]   Digital fingerprinting codes: Problem statements, constructions, identification of traitors [J].
Barg, A ;
Blakley, GR ;
Kabatiansky, GA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (04) :852-865
[3]   Collusion-secure fingerprinting for digital data [J].
Boneh, D ;
Shaw, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :1897-1905
[4]   Tracing traitors [J].
Chor, B ;
Fiat, A ;
Naor, M ;
Pinkas, B .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) :893-910
[5]  
Cohen A. S., 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252), DOI 10.1109/ISIT.2001.935868
[6]   The Gaussian watermarking game [J].
Cohen, AS ;
Lapidoth, A .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (06) :1639-1667
[7]   Copyright protection for digital data [J].
Cohen, G ;
Encheva, S ;
Zémor, G .
IEEE COMMUNICATIONS LETTERS, 2000, 4 (05) :158-160
[8]  
COVER TM, 1973, IEEE T INFORM THEORY, V19, P73, DOI 10.1109/TIT.1973.1054929
[9]  
CSISZAR I, 1981, CODING THEOREMS DISC
[10]  
DITTMANN J, 2001, COMBINING DIGITAL WA