Skip to main content

A New Collusion Attack and Its Performance Evaluation

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2613))

Abstract

Digital watermarking is a technology proposed to help address the concern of copyright protection for digital content. To facilitate tracing of copyright violators, different watermarks carrying information about the transaction or content recipient can be embedded into multimedia content before distribution. Such form of “personalised” watermark is called “fingerprint”. A powerful attack against digital fingerprinting is the collusion attack, in which different fingerprinted copies of same host data are jointly processed to remove the fingerprints or hinder their detection. This paper first studies a number of existing collusion attack schemes against image fingerprinting. A new collusion attack scheme is then proposed and evaluated, both analytically and empirically. Attack performance in terms of fingerprint detectability and visual quality degradation after attack is assessed. Results obtained from spread spectrum fingerprinting experiments show that the proposed attack can impede fingerprint detection using as few as three fingerprinted images without introducing noticeable visual degradation, hence it is more powerful than those reported in literature. It is also found that increasing the fingerprint embedding strength and spreading factor do not help resist such malicious attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hartung, F., Su, J.K., Girod, B., “Spread spectrum watermarking: malicious attacks and counterattacks,” Proceedings SPIE, Security and Watermarking of Multimedia Contents, Electronic Imaging 1999, vol. 3657, San Jose, CA, 1999.

    Google Scholar 

  2. Petitcolas, F., Anderson, R., Kuhn, M., “Attacks on copyright marking systems,” Proceedings of the Second International Workshop in Information Hiding, Portland, 1998.

    Google Scholar 

  3. Boneh, D., Shaw, J., “Collusion-secure fingerprinting for digital data,” IEEE Transactions on Information Theory, vol. 44, no. 5, 1998.

    Google Scholar 

  4. Trappe, W., Wu, M., Liu, K.J.R., “Collusion-resistant fingerprinting for multimedia,” IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, FL, 2002.

    Google Scholar 

  5. Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T., “Attack modelling: towards a second generation watermarking benchmark,” Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking, vol. 81, no. 6, 2001.

    Google Scholar 

  6. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T., “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no.12, 1997.

    Google Scholar 

  7. Stone, H., “Analysis of attacks on image watermarks with randomised coefficients,” NEC Technical Report, 1996.

    Google Scholar 

  8. Brunk, H.D., “An introduction to mathematical statistics,” Lexington: Xerox College Publishing, 3rd ed., 1975.

    Google Scholar 

  9. Podilchuk, C., Zeng, W., “Image adaptive watermarking using visual models,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, 1998.

    Google Scholar 

  10. Devore, J., Peck, R., “Introductory statistics,” MN: West Publishing Company, 1990.

    Google Scholar 

  11. David, H.A., “Order statistics,” NY: John Wiley and Son, 1981.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wahadaniah, V., Guan, Y.L., Chua, H.C. (2003). A New Collusion Attack and Its Performance Evaluation. In: Kim, H.J. (eds) Digital Watermarking. IWDW 2002. Lecture Notes in Computer Science, vol 2613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36617-2_7

Download citation

  • DOI: https://doi.org/10.1007/3-540-36617-2_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-01217-7

  • Online ISBN: 978-3-540-36617-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics