Abstract
Digital watermarking is a technology proposed to help address the concern of copyright protection for digital content. To facilitate tracing of copyright violators, different watermarks carrying information about the transaction or content recipient can be embedded into multimedia content before distribution. Such form of “personalised” watermark is called “fingerprint”. A powerful attack against digital fingerprinting is the collusion attack, in which different fingerprinted copies of same host data are jointly processed to remove the fingerprints or hinder their detection. This paper first studies a number of existing collusion attack schemes against image fingerprinting. A new collusion attack scheme is then proposed and evaluated, both analytically and empirically. Attack performance in terms of fingerprint detectability and visual quality degradation after attack is assessed. Results obtained from spread spectrum fingerprinting experiments show that the proposed attack can impede fingerprint detection using as few as three fingerprinted images without introducing noticeable visual degradation, hence it is more powerful than those reported in literature. It is also found that increasing the fingerprint embedding strength and spreading factor do not help resist such malicious attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hartung, F., Su, J.K., Girod, B., “Spread spectrum watermarking: malicious attacks and counterattacks,” Proceedings SPIE, Security and Watermarking of Multimedia Contents, Electronic Imaging 1999, vol. 3657, San Jose, CA, 1999.
Petitcolas, F., Anderson, R., Kuhn, M., “Attacks on copyright marking systems,” Proceedings of the Second International Workshop in Information Hiding, Portland, 1998.
Boneh, D., Shaw, J., “Collusion-secure fingerprinting for digital data,” IEEE Transactions on Information Theory, vol. 44, no. 5, 1998.
Trappe, W., Wu, M., Liu, K.J.R., “Collusion-resistant fingerprinting for multimedia,” IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, FL, 2002.
Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T., “Attack modelling: towards a second generation watermarking benchmark,” Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking, vol. 81, no. 6, 2001.
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T., “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no.12, 1997.
Stone, H., “Analysis of attacks on image watermarks with randomised coefficients,” NEC Technical Report, 1996.
Brunk, H.D., “An introduction to mathematical statistics,” Lexington: Xerox College Publishing, 3rd ed., 1975.
Podilchuk, C., Zeng, W., “Image adaptive watermarking using visual models,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, 1998.
Devore, J., Peck, R., “Introductory statistics,” MN: West Publishing Company, 1990.
David, H.A., “Order statistics,” NY: John Wiley and Son, 1981.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wahadaniah, V., Guan, Y.L., Chua, H.C. (2003). A New Collusion Attack and Its Performance Evaluation. In: Kim, H.J. (eds) Digital Watermarking. IWDW 2002. Lecture Notes in Computer Science, vol 2613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36617-2_7
Download citation
DOI: https://doi.org/10.1007/3-540-36617-2_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-01217-7
Online ISBN: 978-3-540-36617-1
eBook Packages: Springer Book Archive