A Novel Collusion Attack Strategy for Digital Fingerprinting

被引:0
|
作者
Ling, Hefei [1 ]
Feng, Hui [1 ]
Zou, Fuhao [1 ]
Yan, Weiqi [2 ]
Lu, Zhengding [1 ]
机构
[1] Huazhong Univ Sci Technol, Coll Comp Sci, Wuhan, Hubei, Peoples R China
[2] Queens Univ Belfast, Inst ECIT, Belfast BT7 1NN, Antrim, North Ireland
来源
DIGITAL WATERMARKING | 2011年 / 6526卷
关键词
Digital fingerprinting; collusion attack; optimization; Gaussian noise; WATERMARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital fingerprinting is a technology which aims to embed unique marks with traceability in order to identify users who use their multimedia content for unintended purpose. A cost-efficient attack against digital fingerprinting, known as collusion attack, involves a group of users who combine their fingerprinted content for the purpose of attenuating or removing the fingerprints. In this paper, we analyze and simulate the effect of Gaussian noise with different energies added in the noise-free forgery on both the detection performance of correlation-based detector and the perceptual quality of the attacked content. Based upon the analysis and the principal of informed watermark embedding, we propose a novel collusion attack strategy, self-adaptive noise optimization (SANO) collusion attack. The experimental results, under the assumption that orthogonal fingerprints are used, show that the proposed collusion attack performs more effectively than the most of existed collusion attacks. Less than three pieces of fingerprinted content can sufficiently interrupt orthogonal fingerprints which accommodate many thousands of users. Meanwhile, high fidelity of the attacked content is retained after the proposed collusion attack.
引用
收藏
页码:224 / +
页数:3
相关论文
共 50 条
  • [41] Collusion resistant multimedia fingerprinting: A unified framework
    Wu, M
    Trappe, W
    Wang, ZJ
    Liu, KJR
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 748 - 759
  • [42] A Collusion Attack on the Fuzzy Vault Scheme
    Poon, Hoi Ting
    Miri, Ali
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (01): : 27 - 34
  • [43] Collusion Attack Detection in Networked Systems
    Bhuiyan, Md Zakirul Alam
    Wu, Jie
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 286 - 293
  • [44] Android collusion attack detection model
    Yang H.
    Wang Z.
    2018, Editorial Board of Journal on Communications (39): : 27 - 36
  • [45] A novel embedding method for an anti-collusion fingerprinting by embedding both a code and an orthogonal fingerprint
    Jang, Dalwon
    Yoo, Chang D.
    2006 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-13, 2006, : 5343 - 5346
  • [46] Collusion of fingerprints via the gradient attack
    Kirovski, D
    2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 2280 - 2284
  • [47] A Novel Active Website Fingerprinting Attack against Tor Anonymous System
    He, Gaofeng
    Yang, Ming
    Gu, Xiaodan
    Luo, Junzhou
    Ma, Yuanyuan
    PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2014, : 112 - 117
  • [48] A Novel Collusion Combination Cyberattack Strategy Against Integrated Energy System
    Zhang, YunNing
    Tu, Xun
    Fu, WenLong
    Gao, YiHeng
    Chen, Xi
    Zhang, Lei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (11) : 12669 - 12683
  • [49] A framework for optimizing nonlinear collusion attacks on fingerprinting systems
    Kiyavash, Negar
    Moulin, Pierre
    2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 1170 - 1175
  • [50] Fair collusion attacks on scalable viideo fingerprinting systems
    Zhao, HV
    Liu, KJR
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 1045 - 1048