On the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking

نویسندگان

  • Xi Chen
  • Shiguo Lian
چکیده

Digital fingerprinting is the technique used for traitor tracing in multimedia content distribution. It embeds unique customer information (e.g., customer ID) into multimedia content and generates different copies for different customers. The unique customer information can be extracted from the illegal copy and used to tell the traitor who re-distributes his copy to other unauthorized customers. Till now, there exist some fingerprint embedding algorithms, such as additive embedding, multiplicative embedding, quantization embedding, etc. However, the ability to resist collusion attacks is not studied. Collusion attack is the biggest threat to fingerprinting algorithms, which combines several copies together to produce a new copy without customer information. In this paper, the fingerprinting algorithm based on additive embedding is considered, its robustness against various collusion attacks are analyzed. The theoretical results are given, together with some simulation results. As is shown, the considered fingerprinting algorithm is robust against some of the collusion attacks, while becomes fragile to some other collusion attacks with the rise of the number of colluders. It is expected to provide some advices to design or analyze fingerprinting algorithms. Index Terms — security in digital systems, digital fingerprinting, additive watermarking, collusion resistance

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simple Collusion-Secure Fingerprinting Schemes for Images

This paper describes a robust watermarking algorithm and a collusion-secure fingerprinting scheme based on it. Watermarking robustness is obtained by using the JPEG algorithm to decide mark location and magnitude; the proposed algorithm supports multiple marking. The properties of dual binary Hamming codes are exploited to obtain a fingerprinting scheme secure against collusion of two buyers. T...

متن کامل

Exploring QIM-based anti-collusion fingerprinting for multimedia

Digital fingerprinting is an emerging technology to protect multimedia from unauthorized use by embedding a unique fingerprint signal into each user’s copy. A robust embedding algorithm is an important building block in order to make the fingerprint resilient to various distortions and collusion attacks. Spread spectrum embedding has been widely used for multimedia fingerprinting. In this paper...

متن کامل

A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography

Information transmission and steganography p. 15 On the existence of perfect stegosystems p. 30 Towards multi-class blind steganalyzer for JPEG images p. 39 An efficient fingerprinting scheme with symmetric and commutative encryption p. 54 Collusion secure convolutional spread spectrum fingerprinting p. 67 Performance study on multimedia fingerprinting employing traceability codes p. 84 Regular...

متن کامل

Expectation maximization decoding of Tardos probabilistic fingerprinting code

This paper presents our recent works on multimedia fingerprinting, improving both the fingerprinting code and the watermarking scheme. Our first contribution focuses on deriving a better accusation process for the well known Tardos codes. It appears that Tardos orginal decoding is very conservative: its performances are guaranteed whatever the collusion strategy. Indeed, major improvements stem...

متن کامل

Probabilistic fingerprinting codes used to detect traitor zero-bit watermark

This paper presents a traitor tracing method dedicated to video content distribution. It is based on a probabilistic traitor tracing code and an orthogonal zero-bit informed watermark. We use the well-known Tardos fingerprinting tracing function to reduce the search space of suspicious users. Their guiltiness is then confirmed by detecting the presence of a personal watermark embedded with a pe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Multimedia

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011