Skip to main content

Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting

  • Conference paper
Information Hiding (IH 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4437))

Included in the following conference series:

  • 1074 Accesses

Abstract

Digital fingerprinting is a technique to prevent customers from redistributing multimedia contents illegally. Main attack for fingerprinting is the collusion attack, where multiple users collude by creating an average or median of their individual fingerprinted copies, and escape identification. Previous research such as ACC (anti-collusion code) cannot support large number of users, and also vulnerable to LCCA (linear combination collusion attack). We present a practical SACC (scalable ACC) scheme to generate codebooks for supporting large number of users; and angular decoding scheme to be robust on LCCA. We implemented the SACC codebook using a Gaussian distributed random variable for various attack robustness, and the fingerprint embedding using human visual system based watermarking scheme. We experimented with standard test images for collusion detection performance, and it shows good collusion detection performance over average, median attacks. For LCCA collusion attack on SACC, our angular decoding scheme identifies the correct colluder set under various WNR (watermark to noise ratio).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yacobi, Y.: Improved Boneh-Shaw Content Fingerprinting. In: Proc. CTRSA 2001, pp. 378–391 (2001)

    Google Scholar 

  2. Trappe, W., Wu, M., Wangm, Z.J., Liu, K.J.R.: Anti-Collusion Fingerprinting for Multimedia. IEEE Trans. Signal Proc. 51, 1069–1087 (2003)

    Article  Google Scholar 

  3. Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Trans. Inform. Theory 44, 1897–1905 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  4. Colbourn, C.J., Dinitz, J.H.: The CRC Handbook of Combinatorial Design. CRC Press, Boca Raton (1996)

    Google Scholar 

  5. Kundur, D., Karthik, K.: Video Fingerprinting and Encryption Principles for Digital Rights Management. IEEE Proc. 92, 918–932 (2004)

    Article  Google Scholar 

  6. Wu, Y.: Linear Combination Collusion Attacks and its Application on an Anti-Collusion Fingerprinting. IEEE Conf. on Acoustics, Speech, and Signal Processing 51, 1069–1087 (2005)

    Google Scholar 

  7. Hassibi, B., Vikalo, H.: On the Sphere Decoding Algorithm I. Expected Complexity. IEEE trans. on signal processing 53, 2806–2818 (2005)

    Article  MathSciNet  Google Scholar 

  8. Li., Z., Trappe, W.: Collusion-Resistant Fingerprinting from WBE sequence Sets. IEEE Conf. on communications 2, 1336–1340 (2005)

    Google Scholar 

  9. Voloshynovskiy, S., Herrige, A., Baumgaertner, N., Pun, T.: A Stochastic Approach to Content Adaptive Digital Image Watermarking. In: 3rd Int. Workshop on Information Hiding. LNCS, vol. 1768, pp. 211–236. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  10. Watson, A.B., Borthwick, R., Taylor, M.: Image Quality and Entropy Masking. In: SPIE Conf. Human Vision, Visual Processing, and Digital Display VI (1997)

    Google Scholar 

  11. Kim, S.W., Suthaharan, S., Lee, H.K., Rao, K.R.: An Image Watermarking Scheme using Visual Model and BN Distribution. IEE Elect. Letter 35(3) (February 1999)

    Google Scholar 

  12. Walpole, R.E., Myers, R.H., Myers, S.L.: Probability and Statistics for Engineers and Scientists, 6th edn. Prentice-Hall, Englewood Cliffs (1998)

    Google Scholar 

  13. Zhao, H., Wu, M., Wang, J., Ray Liu, K.J.: Nonlinear Collusion Attacks on Independent Fingerprints for Multimedia. ICASSP 5, 664–667 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jan L. Camenisch Christian S. Collberg Neil F. Johnson Phil Sallee

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seol, JM., Kim, SW. (2007). Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds) Information Hiding. IH 2006. Lecture Notes in Computer Science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74124-4_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74123-7

  • Online ISBN: 978-3-540-74124-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics