Skip to main content

Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting

  • Conference paper
  • 1059 Accesses

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4437)

Abstract

Digital fingerprinting is a technique to prevent customers from redistributing multimedia contents illegally. Main attack for fingerprinting is the collusion attack, where multiple users collude by creating an average or median of their individual fingerprinted copies, and escape identification. Previous research such as ACC (anti-collusion code) cannot support large number of users, and also vulnerable to LCCA (linear combination collusion attack). We present a practical SACC (scalable ACC) scheme to generate codebooks for supporting large number of users; and angular decoding scheme to be robust on LCCA. We implemented the SACC codebook using a Gaussian distributed random variable for various attack robustness, and the fingerprint embedding using human visual system based watermarking scheme. We experimented with standard test images for collusion detection performance, and it shows good collusion detection performance over average, median attacks. For LCCA collusion attack on SACC, our angular decoding scheme identifies the correct colluder set under various WNR (watermark to noise ratio).

Keywords

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yacobi, Y.: Improved Boneh-Shaw Content Fingerprinting. In: Proc. CTRSA 2001, pp. 378–391 (2001)

    Google Scholar 

  2. Trappe, W., Wu, M., Wangm, Z.J., Liu, K.J.R.: Anti-Collusion Fingerprinting for Multimedia. IEEE Trans. Signal Proc. 51, 1069–1087 (2003)

    CrossRef  Google Scholar 

  3. Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Trans. Inform. Theory 44, 1897–1905 (1998)

    CrossRef  MATH  MathSciNet  Google Scholar 

  4. Colbourn, C.J., Dinitz, J.H.: The CRC Handbook of Combinatorial Design. CRC Press, Boca Raton (1996)

    Google Scholar 

  5. Kundur, D., Karthik, K.: Video Fingerprinting and Encryption Principles for Digital Rights Management. IEEE Proc. 92, 918–932 (2004)

    CrossRef  Google Scholar 

  6. Wu, Y.: Linear Combination Collusion Attacks and its Application on an Anti-Collusion Fingerprinting. IEEE Conf. on Acoustics, Speech, and Signal Processing 51, 1069–1087 (2005)

    Google Scholar 

  7. Hassibi, B., Vikalo, H.: On the Sphere Decoding Algorithm I. Expected Complexity. IEEE trans. on signal processing 53, 2806–2818 (2005)

    CrossRef  MathSciNet  Google Scholar 

  8. Li., Z., Trappe, W.: Collusion-Resistant Fingerprinting from WBE sequence Sets. IEEE Conf. on communications 2, 1336–1340 (2005)

    Google Scholar 

  9. Voloshynovskiy, S., Herrige, A., Baumgaertner, N., Pun, T.: A Stochastic Approach to Content Adaptive Digital Image Watermarking. In: 3rd Int. Workshop on Information Hiding. LNCS, vol. 1768, pp. 211–236. Springer, Heidelberg (1999)

    CrossRef  Google Scholar 

  10. Watson, A.B., Borthwick, R., Taylor, M.: Image Quality and Entropy Masking. In: SPIE Conf. Human Vision, Visual Processing, and Digital Display VI (1997)

    Google Scholar 

  11. Kim, S.W., Suthaharan, S., Lee, H.K., Rao, K.R.: An Image Watermarking Scheme using Visual Model and BN Distribution. IEE Elect. Letter 35(3) (February 1999)

    Google Scholar 

  12. Walpole, R.E., Myers, R.H., Myers, S.L.: Probability and Statistics for Engineers and Scientists, 6th edn. Prentice-Hall, Englewood Cliffs (1998)

    Google Scholar 

  13. Zhao, H., Wu, M., Wang, J., Ray Liu, K.J.: Nonlinear Collusion Attacks on Independent Fingerprints for Multimedia. ICASSP 5, 664–667 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jan L. Camenisch Christian S. Collberg Neil F. Johnson Phil Sallee

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seol, JM., Kim, SW. (2007). Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds) Information Hiding. IH 2006. Lecture Notes in Computer Science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74124-4_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74123-7

  • Online ISBN: 978-3-540-74124-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics