Abstract
Digital fingerprinting is a technology which aims to embed unique marks with traceability in order to identify users who use their multimedia content for unintended purpose. A cost-efficient attack against digital fingerprinting, known as collusion attack, involves a group of users who combine their fingerprinted content for the purpose of attenuating or removing the fingerprints. In this paper, we analyze and simulate the effect of Gaussian noise with different energies added in the noise-free forgery on both the detection performance of correlation-based detector and the perceptual quality of the attacked content. Based upon the analysis and the principal of informed watermark embedding, we propose a novel collusion attack strategy, self-adaptive noise optimization (SANO) collusion attack. The experimental results, under the assumption that orthogonal fingerprints are used, show that the proposed collusion attack performs more effectively than the most of existed collusion attacks. Less than three pieces of fingerprinted content can sufficiently interrupt orthogonal fingerprints which accommodate many thousands of users. Meanwhile, high fidelity of the attacked content is retained after the proposed collusion attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44(5), 1897–1905 (1998)
Wang, Z.J., Wu, M., Zhao, H., Liu, K.J.R., Trappe, W.: Resistance of orthogonal Gaussian fingerprints to collusion attacks. In: International Conference on Multimedia and Expo., pp. 724–727 (2003)
Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing 51(4), 1069–1087 (2003)
Dittmann, J., Schmitt, P., Saar, E., Schwenk, J., Ueberberg, J.: Combining digital watermarks and collusion secure fingerprints for digital images. Journal of Electronic Imaging 9(4), 456–467 (2000)
He, S., Wu, M.: Joint coding and embedding techniques for Multimedia Fingerprinting. IEEE Transactions on Information Forensics and Security 1(2), 231–247 (2006)
Cha, B.H., Kuo, C.C.J.: Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks. IEEE Transactions on Information Forensics and Security 4(3), 302–317 (2009)
Byung-Ho, C., Kuo, C.C.J.: Analysis of time-varying collusion attacks in fingerprinting systems: Capacity and throughput. In: IEEE International Symposium on Circuits and Systems, ISCAS 2009, pp. 493–496 (2009)
Wang, Z.J., Wu, M., Zhao, H.V., Trappe, W., Liu, K.J.R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Transactions on Image Processing 14(6), 804–821 (2005)
Wang, Z.J., Wu, M., Trappe, W., Liu, K.J.R.: Group-oriented fingerprinting for multimedia forensics. EURASIP Journal on Applied Signal Processing 14(11), 2 (2004)
Stone, H.: Analysis of Attacks on image watermarks with randomized coefficients. NEC Res. Inst., Tech. Rep., vol. 96-045 (1996)
Zhao, H.V., Min, W., Wang, Z.J., Liu, K.J.R.: Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. IEEE Transactions on Image Processing 14(5), 646–661 (2005)
Hong, Z., Min, W., Wang, Z.J., Liu, K.J.R.: Performance of detection statistics under collusion attacks on independent multimedia fingerprints. In: Proceedings of 2003 International Conference on Multimedia and Expo., ICME 2003, vol. 201, pp. I-205–I-208 (2003)
Moulin, P., Kiyevash, N.: Performance of Random Fingerprinting Codes Under Arbitrary Nonlinear Attacks. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2007, pp. II-157–II-160 (2007)
Kiyavash, N., Moulin, P.: A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems. In: 2006 40th Annual Conference on Information Sciences and Systems, pp. 1170–1175 (2006)
Kiyavash, N., Moulin, P.: Performance of Orthogonal Fingerprinting Codes Under Worst-Case Noise. IEEE Transactions on Information Forensics and Security 4(3), 293–301 (2009)
Kirovski, D., Mihcak, M.K.: Bounded Gaussian fingerprints and the gradient collusion attack. In: Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 2, pp. 1037–1040 (2005)
Kirovski, D.: Collusion of fingerprints via the gradient attack. In: IEEE International Symposium on Information Theory, Citeseer, p. 2280 (2005)
He, S., Kirovski, D., Wu, M.: Colluding Fingerprinted Video Using the Gradient Attack. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2007, vol. 2 (2007)
Podilchuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications 16(4), 525–539 (1998)
He, S., Wu, M.: Collusion-Resistant Video Fingerprinting for Large User Group. IEEE Transactions on Information Forensics and Security 2(4), 697–709 (2007)
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)
Miller, M.L., Doerr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Transactions on Image Processing 13(6), 792–807 (2004)
Lin, W.S., Zhao, H.V., Liu, K.J.R.: A Game Theoretic Framework for Colluder-Detector Behavior Forensics. In: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 2, pp. II-721–II-724 (2007)
The USC-SIPI Image Database. Electronic Engineering Department, University of Southern California, http://sipi.usc.edu/database/index.html , (accessed September 9, 2009)
Ground Truth Database. Department of Computer Science and Engineering, University of Washington, http://www.cs.washington.edu/research/imagedatabase/ , (accessed September 9, 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ling, H., Feng, H., Zou, F., Yan, W., Lu, Z. (2011). A Novel Collusion Attack Strategy for Digital Fingerprinting. In: Kim, HJ., Shi, Y.Q., Barni, M. (eds) Digital Watermarking. IWDW 2010. Lecture Notes in Computer Science, vol 6526. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18405-5_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-18405-5_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-18404-8
Online ISBN: 978-3-642-18405-5
eBook Packages: Computer ScienceComputer Science (R0)