Collusion-secure patchwork embedding for transaction watermarking

被引:0
|
作者
Berchtold, Waldemar [1 ]
Zmudzinski, Sascha [1 ]
Schaefer, Marcel [1 ]
Steinebach, Martin [1 ]
机构
[1] Fraunhofer Inst Secure Informat Technol SIT, D-64295 Darmstadt, Germany
关键词
audio watermarking; anti-collusion; robustness; Patchwork embedding;
D O I
10.1117/12.872584
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Digital transaction watermarking today is a widely accepted mechanism to trace back copyright infringements. Here, copies of a work are individualized by embedding user-specific watermark messages. One major threat on transaction watermarking are collusion attacks. Here, multiple individualized copies of the work are compared and/or combined to attack the integrity or availability of the embedded watermark message. In this work, we show how Patchwork embedding can be adapted to provide a maximum of resistance against collusion attacks at reduced payload and improved robustness.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] A stern-based collusion-secure software watermarking algorithm and its implementation
    Ai, Jieqing
    Sun, Xingming
    Liu, Yunhao
    Cox, Ingemar J.
    Sun, Guang
    Luo, Yi
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 813 - +
  • [2] Separable Collusion-Secure Multimedia Codes
    Egorova, E. E.
    Kabatiansky, G. A.
    [J]. PROBLEMS OF INFORMATION TRANSMISSION, 2021, 57 (02) : 178 - 198
  • [3] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
  • [4] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 452 - 465
  • [5] Lower bounds for collusion-secure fingerprinting
    Peikert, C
    Shelat, A
    Smith, A
    [J]. PROCEEDINGS OF THE FOURTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2003, : 472 - 479
  • [6] Separable Collusion-Secure Multimedia Codes
    E. E. Egorova
    G. A. Kabatiansky
    [J]. Problems of Information Transmission, 2021, 57 : 178 - 198
  • [7] Attacks on collusion-secure fingerprinting for multicast video protocols
    Baaziz, N
    Sami, Y
    [J]. DFMA '05: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS FOR MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2004, : 210 - 216
  • [8] Collusion-secure fingerprinting and B2-sequences
    Cohen, G
    Litsyn, S
    Zémor, G
    [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 242 - 242
  • [9] Cryptographic methods for collusion-secure fingerprinting of digital data
    Biehl, I
    Meyer, B
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2002, 28 (01) : 59 - 75
  • [10] Error- and collusion-secure fingerprinting for digital data
    Guth, HJ
    Pfitzmann, B
    [J]. INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 134 - 145