Skip to main content

A Novel Collusion Attack Strategy for Digital Fingerprinting

  • Conference paper
Digital Watermarking (IWDW 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6526))

Included in the following conference series:

Abstract

Digital fingerprinting is a technology which aims to embed unique marks with traceability in order to identify users who use their multimedia content for unintended purpose. A cost-efficient attack against digital fingerprinting, known as collusion attack, involves a group of users who combine their fingerprinted content for the purpose of attenuating or removing the fingerprints. In this paper, we analyze and simulate the effect of Gaussian noise with different energies added in the noise-free forgery on both the detection performance of correlation-based detector and the perceptual quality of the attacked content. Based upon the analysis and the principal of informed watermark embedding, we propose a novel collusion attack strategy, self-adaptive noise optimization (SANO) collusion attack. The experimental results, under the assumption that orthogonal fingerprints are used, show that the proposed collusion attack performs more effectively than the most of existed collusion attacks. Less than three pieces of fingerprinted content can sufficiently interrupt orthogonal fingerprints which accommodate many thousands of users. Meanwhile, high fidelity of the attacked content is retained after the proposed collusion attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44(5), 1897–1905 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  2. Wang, Z.J., Wu, M., Zhao, H., Liu, K.J.R., Trappe, W.: Resistance of orthogonal Gaussian fingerprints to collusion attacks. In: International Conference on Multimedia and Expo., pp. 724–727 (2003)

    Google Scholar 

  3. Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing 51(4), 1069–1087 (2003)

    Article  MathSciNet  Google Scholar 

  4. Dittmann, J., Schmitt, P., Saar, E., Schwenk, J., Ueberberg, J.: Combining digital watermarks and collusion secure fingerprints for digital images. Journal of Electronic Imaging 9(4), 456–467 (2000)

    Article  Google Scholar 

  5. He, S., Wu, M.: Joint coding and embedding techniques for Multimedia Fingerprinting. IEEE Transactions on Information Forensics and Security 1(2), 231–247 (2006)

    Article  Google Scholar 

  6. Cha, B.H., Kuo, C.C.J.: Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks. IEEE Transactions on Information Forensics and Security 4(3), 302–317 (2009)

    Article  Google Scholar 

  7. Byung-Ho, C., Kuo, C.C.J.: Analysis of time-varying collusion attacks in fingerprinting systems: Capacity and throughput. In: IEEE International Symposium on Circuits and Systems, ISCAS 2009, pp. 493–496 (2009)

    Google Scholar 

  8. Wang, Z.J., Wu, M., Zhao, H.V., Trappe, W., Liu, K.J.R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Transactions on Image Processing 14(6), 804–821 (2005)

    Article  Google Scholar 

  9. Wang, Z.J., Wu, M., Trappe, W., Liu, K.J.R.: Group-oriented fingerprinting for multimedia forensics. EURASIP Journal on Applied Signal Processing 14(11), 2 (2004)

    Google Scholar 

  10. Stone, H.: Analysis of Attacks on image watermarks with randomized coefficients. NEC Res. Inst., Tech. Rep., vol. 96-045 (1996)

    Google Scholar 

  11. Zhao, H.V., Min, W., Wang, Z.J., Liu, K.J.R.: Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. IEEE Transactions on Image Processing 14(5), 646–661 (2005)

    Article  Google Scholar 

  12. Hong, Z., Min, W., Wang, Z.J., Liu, K.J.R.: Performance of detection statistics under collusion attacks on independent multimedia fingerprints. In: Proceedings of 2003 International Conference on Multimedia and Expo., ICME 2003, vol. 201, pp. I-205–I-208 (2003)

    Google Scholar 

  13. Moulin, P., Kiyevash, N.: Performance of Random Fingerprinting Codes Under Arbitrary Nonlinear Attacks. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2007, pp. II-157–II-160 (2007)

    Google Scholar 

  14. Kiyavash, N., Moulin, P.: A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems. In: 2006 40th Annual Conference on Information Sciences and Systems, pp. 1170–1175 (2006)

    Google Scholar 

  15. Kiyavash, N., Moulin, P.: Performance of Orthogonal Fingerprinting Codes Under Worst-Case Noise. IEEE Transactions on Information Forensics and Security 4(3), 293–301 (2009)

    Article  Google Scholar 

  16. Kirovski, D., Mihcak, M.K.: Bounded Gaussian fingerprints and the gradient collusion attack. In: Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 2, pp. 1037–1040 (2005)

    Google Scholar 

  17. Kirovski, D.: Collusion of fingerprints via the gradient attack. In: IEEE International Symposium on Information Theory, Citeseer, p. 2280 (2005)

    Google Scholar 

  18. He, S., Kirovski, D., Wu, M.: Colluding Fingerprinted Video Using the Gradient Attack. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2007, vol. 2 (2007)

    Google Scholar 

  19. Podilchuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications 16(4), 525–539 (1998)

    Article  Google Scholar 

  20. He, S., Wu, M.: Collusion-Resistant Video Fingerprinting for Large User Group. IEEE Transactions on Information Forensics and Security 2(4), 697–709 (2007)

    Article  Google Scholar 

  21. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  22. Miller, M.L., Doerr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Transactions on Image Processing 13(6), 792–807 (2004)

    Article  Google Scholar 

  23. Lin, W.S., Zhao, H.V., Liu, K.J.R.: A Game Theoretic Framework for Colluder-Detector Behavior Forensics. In: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 2, pp. II-721–II-724 (2007)

    Google Scholar 

  24. The USC-SIPI Image Database. Electronic Engineering Department, University of Southern California, http://sipi.usc.edu/database/index.html , (accessed September 9, 2009)

  25. Ground Truth Database. Department of Computer Science and Engineering, University of Washington, http://www.cs.washington.edu/research/imagedatabase/ , (accessed September 9, 2009)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ling, H., Feng, H., Zou, F., Yan, W., Lu, Z. (2011). A Novel Collusion Attack Strategy for Digital Fingerprinting. In: Kim, HJ., Shi, Y.Q., Barni, M. (eds) Digital Watermarking. IWDW 2010. Lecture Notes in Computer Science, vol 6526. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18405-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-18405-5_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-18404-8

  • Online ISBN: 978-3-642-18405-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics