Abstract
Digital fingerprinting is a technique to prevent customers from redistributing multimedia contents illegally. Main attack for fingerprinting is the collusion attack, where multiple users collude by creating an average or median of their individual fingerprinted copies, and escape identification. Previous research such as ACC (anti-collusion code) cannot support large number of users, and also vulnerable to LCCA (linear combination collusion attack). We present a practical SACC (scalable ACC) scheme to generate codebooks for supporting large number of users; and angular decoding scheme to be robust on LCCA. We implemented the SACC codebook using a Gaussian distributed random variable for various attack robustness, and the fingerprint embedding using human visual system based watermarking scheme. We experimented with standard test images for collusion detection performance, and it shows good collusion detection performance over average, median attacks. For LCCA collusion attack on SACC, our angular decoding scheme identifies the correct colluder set under various WNR (watermark to noise ratio).
Chapter PDF
Similar content being viewed by others
References
Yacobi, Y.: Improved Boneh-Shaw Content Fingerprinting. In: Proc. CTRSA 2001, pp. 378–391 (2001)
Trappe, W., Wu, M., Wangm, Z.J., Liu, K.J.R.: Anti-Collusion Fingerprinting for Multimedia. IEEE Trans. Signal Proc. 51, 1069–1087 (2003)
Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Trans. Inform. Theory 44, 1897–1905 (1998)
Colbourn, C.J., Dinitz, J.H.: The CRC Handbook of Combinatorial Design. CRC Press, Boca Raton (1996)
Kundur, D., Karthik, K.: Video Fingerprinting and Encryption Principles for Digital Rights Management. IEEE Proc. 92, 918–932 (2004)
Wu, Y.: Linear Combination Collusion Attacks and its Application on an Anti-Collusion Fingerprinting. IEEE Conf. on Acoustics, Speech, and Signal Processing 51, 1069–1087 (2005)
Hassibi, B., Vikalo, H.: On the Sphere Decoding Algorithm I. Expected Complexity. IEEE trans. on signal processing 53, 2806–2818 (2005)
Li., Z., Trappe, W.: Collusion-Resistant Fingerprinting from WBE sequence Sets. IEEE Conf. on communications 2, 1336–1340 (2005)
Voloshynovskiy, S., Herrige, A., Baumgaertner, N., Pun, T.: A Stochastic Approach to Content Adaptive Digital Image Watermarking. In: 3rd Int. Workshop on Information Hiding. LNCS, vol. 1768, pp. 211–236. Springer, Heidelberg (1999)
Watson, A.B., Borthwick, R., Taylor, M.: Image Quality and Entropy Masking. In: SPIE Conf. Human Vision, Visual Processing, and Digital Display VI (1997)
Kim, S.W., Suthaharan, S., Lee, H.K., Rao, K.R.: An Image Watermarking Scheme using Visual Model and BN Distribution. IEE Elect. Letter 35(3) (February 1999)
Walpole, R.E., Myers, R.H., Myers, S.L.: Probability and Statistics for Engineers and Scientists, 6th edn. Prentice-Hall, Englewood Cliffs (1998)
Zhao, H., Wu, M., Wang, J., Ray Liu, K.J.: Nonlinear Collusion Attacks on Independent Fingerprints for Multimedia. ICASSP 5, 664–667 (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Seol, JM., Kim, SW. (2007). Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds) Information Hiding. IH 2006. Lecture Notes in Computer Science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_22
Download citation
DOI: https://doi.org/10.1007/978-3-540-74124-4_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74123-7
Online ISBN: 978-3-540-74124-4
eBook Packages: Computer ScienceComputer Science (R0)