Resistance analysis of scalable video fingerprinting systems under fair collusion attacks

被引:0
|
作者
Zhao, HV [1 ]
Liu, KJR [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digital rights when distributing multimedia over heterogeneous networks and studies the scalable multimedia fingerprinting systems in which users receive copies of different quality. We investigate the traitor tracing capability of such scalable fingerprinting systems, in particular, the robustness of the embedded fingerprints against multi-user collusion attacks. Under the fairness constraints on collusion that all attackers share the same risk of being captured, we analyze the maximum number of colluders that the fingerprinting systems can withstand, and our results show that multimedia fingerprints can survive collusion attacks by a few dozen colluders.
引用
收藏
页码:3457 / 3460
页数:4
相关论文
共 50 条
  • [21] Increasing resistance to differential power analysis attacks in reconfigurable systems
    Papadopoulos, Konstantinos
    Brokalakis, Andreas
    Papaefstathiou, Ioannis
    2012 16TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (MELECON), 2012, : 115 - 120
  • [22] Survivability Analysis of IoT Systems Under Resource Exhausting Attacks
    Pietrantuono, Roberto
    Ficco, Massimo
    Palmieri, Francesco
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3277 - 3288
  • [23] Performance analysis of email systems under three types of attacks
    Wang, Yang
    Lin, Chuang
    Li, Quan-Lin
    PERFORMANCE EVALUATION, 2010, 67 (06) : 485 - 499
  • [24] On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks
    Zhu, Minghui
    Martinez, Sonia
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (03) : 804 - 808
  • [25] Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks
    Zhang, Qirui
    Liu, Kun
    Pang, Zhonghua
    Xia, Yuanqing
    Liu, Tao
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) : 4926 - 4934
  • [26] Vulnerability analysis and critical areas identification of the power systems under terrorist attacks
    Wang, Shuliang
    Zhang, Jianhua
    Zhao, Mingwei
    Min, Xu
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2017, 473 : 156 - 165
  • [27] Stability Analysis for Networked Control Systems under Denial-of-Service Attacks
    Cao, Rui
    Wu, Jing
    Long, Chengnian
    Li, Shaoyuan
    2015 54TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2015, : 7476 - 7481
  • [28] Mid-term vulnerability analysis of power systems under intentional attacks
    Sayyadipour, Saeed
    Yousefi, Gholam Reza
    Latify, Mohammad Amin
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2016, 10 (15) : 3745 - 3755
  • [29] Security and Performance Tradeoff Analysis of Mobile Offloading Systems Under Timing Attacks
    Meng, Tianhui
    Wolter, Katinka
    Wang, Qiushi
    COMPUTER PERFORMANCE ENGINEERING, 2015, 9272 : 32 - 46
  • [30] A methodological framework for vulnerability analysis of interdependent infrastructure systems under deliberate attacks
    Wang, Shuliang
    Stanley, H. Eugene
    Gao, Yachun
    CHAOS SOLITONS & FRACTALS, 2018, 117 : 21 - 29