skip to main content
research-article

A collusion attack optimization strategy for digital fingerprinting

Published: 20 September 2012 Publication History

Abstract

Collusion attack is a cost-efficient attack for digital fingerprinting. In this article, we propose a novel collusion attack strategy, Iterative Optimization Collusion Attack (IOCA), which is based upon the gradient attack and the principle of informed watermark embedding. We evaluate the performance of the proposed collusion attack strategy in defeating four typical fingerprinting schemes under a well-constructed evaluation framework. The simulation results show that the proposed strategy performs more effectively than the gradient attack, and adopting no more than three fingerprinted copies can sufficiently collapse examined fingerprinting schemes. Meanwhile, the content resulted from the proposed attack still preserves high perceptual quality.

References

[1]
Boneh, D. and Shaw, J. 1998. Collusion-Secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44, 5, 1897--1905.
[2]
Celik, M. U., Sharma, G., and Tekalp, A. M. 2004. Collusion-Resilient fingerprinting by random pre-warping. IEEE Signal Process. Lett. 11, 10, 831--835.
[3]
Cha, B. H. and Kuo, C. C. J. 2009. Robust mc-cdma-based fingerprinting against time-varying collusion attacks. IEEE Trans. Inf. Forensics Secur. 4, 3, 302--317.
[4]
Cox, I. J., Kilian, J., Leighton, F. T., and Shamoon, T. 1997. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 12, 1673--1687.
[5]
Cox, I. J. B. and Miller, M. 2001. Digital Watermarking: Principles and Practice. Morgan Kaufman.
[6]
Ergun, F., Kilian, J., and Kumar, R. 1999. A note on the limits of collusion-resistant watermarks. In Lecture Notes in Computer Science. 140--149.
[7]
Feng, H., Ling, H., Zou, F., Lu, Z., and Chen, J. 2009. A performance evaluation of collusion attacks in multimedia fingerprinting. In Proceedings of the International Conference on Multimedia Information Networking and Security (MINES'09). Vol. 1., IEEE Computer Society, 530--534.
[8]
Feng, H., Ling, H. F., Zou, F. H., Yan, W. Q., and Lu, Z. D. 2010. Optimal collusion attack for digital fingerprinting. In Proceedings of ACM International Conference on Multimedia (MM'10). ACM, New York, 767--770.
[9]
Ground truth database 2009. Department of Computer Science and Engineering, University of Washington, http://www.cs. washington.edu/research/imagedatabase/.
[10]
He, S., Kirovski, D., and Wu, M. 2007. Colluding fingerprinted video using the gradient attack. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'07). Vol. 2., II--161--II--164.
[11]
He, S. and Wu, M. 2005a. Building efficient and effective multimedia fingerprints via joint coding and embedding. In Proceedings of the 7th Workshop on Multimedia and Security. ACM, New York, 127--136.
[12]
He, S. and Wu, M. 2005b. Performance study on multimedia fingerprinting employing traceability codes. In Lecture Notes in Computer Science, Vol. 3710, 84.
[13]
He, S. and Wu, M. 2006. Joint coding and embedding techniques for multimedia fingerprinting. IEEE Trans. Inf. Forensics Secur. 1, 2, 231--247.
[14]
He, S. and Wu, M. 2007. Collusion-Resistant video fingerprinting for large user group. IEEE Trans. Inf. Forensics Secur. 2, 4, 697--709.
[15]
Kilian, J., Leighton, F. T., Matheson, L. R., Shamoon, T. G., Tarjan, R. E., and Zane, F. 1998. Resistance of digital watermarks to collusive attacks. In Proceedings of the IEEE International Symposium on Information Theory. 271.
[16]
Kirovski, D. and Mihcak, M. K. 2005. Bounded gaussian fingerprints and the gradient collusion attack. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. Vol. 2. 1037--1040.
[17]
Kiyavash, N. and Moulin, P. 2006. A framework for optimizing nonlinear collusion attacks on fingerprinting systems. In Proceedings of the 40th Annual Conference on Information Sciences and Systems. 1170--1175.
[18]
Kiyavash, N. and Moulin, P. 2009. Performance of orthogonal fingerprinting codes under worst-case noise. IEEE Trans. Inf. Forensics Secur. 4, 3, 293--301.
[19]
Ling, H., Feng, H., Zou, F., Yan, W., and Lu, Z. 2010. A novel collusion attack strategy for digital fingerprinting. In Proceedings of the International Workshop on Digital Water-marking (IWDW). Lecture Notes in Computer Science, vol. 6526. Springer, 224--238.
[20]
Loo, P. and Kingsbury, N. G. 2001. Motion-Estimation-Based registration of geometrically distorted images for watermark recovery. In SPIE Security and Watermarking of Multimedia Content III Conference. Vol. 4314.
[21]
Miller, M. L., Doerr, G. J., and Cox, I. J. 2004. Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Trans. Image Process. 13, 6, 792--807.
[22]
Min Wu, Wade Trappe, Z. J. W., and Liu, K. R. 2004. Collusion-Resistant fingerprinting for multimedia. IEEE Signal Process. Mag., 15--27.
[23]
Schonberg, D. and Kirovski, D. 2004. Fingerprinting and forensic analysis of multimedia. In Proceeding of the 12th Annual ACM International Conference on Multimedia (MM'04). 788--795.
[24]
Staddon, J. N., Stinson, D. R., and Ruizhong, W. 2001. Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inf. Theory 47, 3, 1042--1049.
[25]
Stone, H. 1996. Analysis of attacks on image watermarks with randomized coefficients. Tech. rep. 96-045, NEC.
[26]
Su, J. K., Eggers, J. J., and Girod, B. 2000. Capacity of digital watermarks subjected to an optimal collusion attack. In European Signal Processing Conference (EUSIPCO '00).
[27]
Trappe, W., Wu, M., Wang, Z. J., and Liu, K. J. R. 2003. Anti-Collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 51, 4, 1069--1087.
[28]
Trung, T. and Martirosyan, S. 2004. On a class of traceability codes. Des. Codes Cryptograph. 31, 2, 125--132.
[29]
Trung, T. and Martirosyan, S. 2005. New constructions for ipp codes. Des. Codes Cryptograph. 35, 227--239.
[30]
The USC-SIPI image database 2009. Electronic Engineering Department, University of Southern California, http://sipi.usc. edu/database/index.html.
[31]
Wang, Z. J., Wu, M., Trappe, W., and Liu, K. J. R. 2004. Group-Oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process. 14, 11, 2.
[32]
Wang, Z. J., Wu, M., Zhao, H., Liu, K. J. R., and Trappe, W. 2003. Resistance of orthogonal gaussian fingerprints to collusion attacks. In Proceeding of the International Conference on Multimedia and Expo (ICME'03). Vol. 1. 724--727.
[33]
Wang, Z. J., Wu, M., Zhao, H. V., Trappe, W., and Liu, K. J. R. 2005. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans. Image Process. 14, 6, 804--821.
[34]
Yan, C., Lin, W. S., and Liu, K. J. R. 2010. Risk-Distortion analysis for video collusion attacks: A mouse-and-cat game. IEEE Trans. Image Process. 19, 7, 1798--1807.
[35]
Zhao, H. V., Min, W., Wang, Z. J., and Liu, K. J. R. 2005. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. IEEE Trans. Image Process. 14, 5, 646--661.

Cited By

View all
  • (2022)Truncated Robust Natural Watermarking With Hungarian OptimizationIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2021.306519932:2(483-495)Online publication date: Feb-2022
  • (2019)A generic collusion attack optimization strategy for traditional spread-spectrum and quantization index modulation fingerprintingMultimedia Tools and Applications10.1007/s11042-014-1948-874:17(6967-6988)Online publication date: 17-Jan-2019
  • (2018)Video watermark application for embedding recipient ID in real-time-encoding VoD serverJournal of Real-Time Image Processing10.1007/s11554-013-0335-411:1(211-222)Online publication date: 20-Dec-2018
  • Show More Cited By

Index Terms

  1. A collusion attack optimization strategy for digital fingerprinting

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 8, Issue 2S
    Special Issue on Multimedia Security
    September 2012
    121 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/2344436
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 September 2012
    Accepted: 01 September 2011
    Revised: 01 July 2011
    Received: 01 November 2010
    Published in TOMM Volume 8, Issue 2S

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Multimedia security
    2. collusion attack
    3. digital fingerprinting
    4. optimization

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 01 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Truncated Robust Natural Watermarking With Hungarian OptimizationIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2021.306519932:2(483-495)Online publication date: Feb-2022
    • (2019)A generic collusion attack optimization strategy for traditional spread-spectrum and quantization index modulation fingerprintingMultimedia Tools and Applications10.1007/s11042-014-1948-874:17(6967-6988)Online publication date: 17-Jan-2019
    • (2018)Video watermark application for embedding recipient ID in real-time-encoding VoD serverJournal of Real-Time Image Processing10.1007/s11554-013-0335-411:1(211-222)Online publication date: 20-Dec-2018
    • (2016)Optimal watermark embedding combining spread spectrum and quantizationEURASIP Journal on Advances in Signal Processing10.1186/s13634-016-0373-82016:1Online publication date: 24-Jun-2016
    • (2016)Secure Social Multimedia Big Data Sharing Using Scalable JFE in the TSHWT DomainACM Transactions on Multimedia Computing, Communications, and Applications10.1145/297857112:4s(1-23)Online publication date: 15-Sep-2016
    • (2014)Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed DomainProceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2014.79(616-621)Online publication date: 24-Sep-2014

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media