Attacks on collusion-secure fingerprinting for multicast video protocols

被引:0
|
作者
Baaziz, N [1 ]
Sami, Y [1 ]
机构
[1] Univ Quebec, Dept Comp Sci & Engn, Ste Foy, PQ G1V 2M3, Canada
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Achievement of digital rights management standards in digital multimedia distribution applications, while never easy, is further compounded by the persevering investigation of different ways of attacking. In this paper, we analyze a well-known fingerprinting scheme for video distribution. We show the vulnerability of this scheme to specific attacks, namely the copy attack and the combined collusion with frame-dropping attack. Several experiments were performed to show the effects of theses attacks. Some solutions are suggested in order to prevent these attacks and to enhance the ability of the fingerprinting scheme to reach its most significant aims, namely the copyright protection and detection of pirates. These solutions are based on valid watermarks incorporating digital signatures, and selective watermarking. Moreover, the application of this revised fingerprinting scheme on a well known multicast protocol yields a significant decrease in the bandwidth and gets around the problem of excessive length of c-secure identity strings.
引用
收藏
页码:210 / 216
页数:7
相关论文
共 50 条
  • [1] Protocols for collusion-secure asymmetric fingerprinting (extended abstract)
    Biehl, I
    Meyer, B
    [J]. STACS 97 - 14TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1997, 1200 : 399 - 412
  • [2] Practical Evaluation of Combined Approach for Collusion-Secure Video Fingerprinting
    Afanasyeva, Alexandra
    Linsky, Evgeny
    Ryzhov, Dmitry
    Ivanov, Denis
    [J]. 2014 XIV INTERNATIONAL SYMPOSIUM ON PROBLEMS OF REDUNDANCY IN INFORMATION AND CONTROL SYSTEMS (REDUNDANCY), 2014, : 6 - 9
  • [3] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
  • [4] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 452 - 465
  • [5] Lower bounds for collusion-secure fingerprinting
    Peikert, C
    Shelat, A
    Smith, A
    [J]. PROCEEDINGS OF THE FOURTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2003, : 472 - 479
  • [6] Collusion-secure fingerprinting and B2-sequences
    Cohen, G
    Litsyn, S
    Zémor, G
    [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 242 - 242
  • [7] Cryptographic methods for collusion-secure fingerprinting of digital data
    Biehl, I
    Meyer, B
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2002, 28 (01) : 59 - 75
  • [8] Error- and collusion-secure fingerprinting for digital data
    Guth, HJ
    Pfitzmann, B
    [J]. INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 134 - 145
  • [9] Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video
    Abdelhedi, Karama
    Chaabane, Faten
    Puech, William
    Ben Amar, Chokri
    [J]. COMPUTER ANALYSIS OF IMAGES AND PATTERNS, CAIP 2021, PT 1, 2021, 13052 : 58 - 68
  • [10] Signature codes for the A-channel and collusion-secure multimedia fingerprinting codes
    Egorova, Elena
    Fernandez, Marcel
    Kabatiansky, Grigory
    Lee, Moon Ho
    [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 3043 - 3047