Collusion-resistant fingerprinting for multimedia

被引:0
|
作者
Trappe, W [1 ]
Wu, M [1 ]
Liu, KR [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Digital fingerprinting is an effective method to identify users who might try to redistribute multimedia content, such as images and video. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cheap and effective attack against such digital fingerprints is collusion, where several differently marked copies of the same content are averaged or combined to disrupt the underlying fingerprint. In this paper, we study the problem of designing fingerprints that can withstand collusion, yet trace colluders. Since, in antipodal CDMA-type watermarking, the correlation contributions only decrease where watermarks differ, by constructing binary code vectors where any subset of k or fewer of these vectors have unique overlap, we may identify groups of k or less colluders. Our construction of such anti-collusion codes (ACC) uses the theory of combinatorial designs, and for n users requires O(rootn) bits. Further, we explore a block matrix structure for the ACC that reduces the computational complexity for identifying colluders and improves the detection capability when colluders belong to the same subgroup.
引用
收藏
页码:3309 / 3312
页数:4
相关论文
共 50 条
  • [21] Collusion-Resistant Audio Fingerprinting System in the Modulated Complex Lapped Transform Domain
    Juan Garcia-Hernandez, Jose
    Feregrino-Uribe, Claudia
    Cumplido, Rene
    PLOS ONE, 2013, 8 (06):
  • [22] A collusion-resistant video watermarking scheme
    Houmansadr, Amir
    Ghaemmaghami, Shahrokh
    INFORMATION HIDING, 2007, 4437 : 343 - +
  • [23] Optimal Collusion-Resistant Mechanisms with Verification
    Penna, Paolo
    Ventre, Carmine
    10TH ACM CONFERENCE ON ELECTRONIC COMMERCE - EC 2009, 2009, : 147 - 156
  • [24] Optimal collusion-resistant mechanisms with verification
    Penna, Paolo
    Ventre, Carmine
    GAMES AND ECONOMIC BEHAVIOR, 2014, 86 : 491 - 509
  • [25] Collusion-Resistant Functional Encryption for RAMs
    Ananth, Prabhanjan
    Chung, Kai-Min
    Fan, Xiong
    Qian, Luowen
    ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 160 - 194
  • [26] A note on the limits of collusion-resistant watermarks
    Ergun, F
    Kilian, J
    Kumar, R
    ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 140 - 149
  • [27] A novel approach to collusion-resistant video watermarking
    Su, K
    Kundur, D
    Hatzinakos, D
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 491 - 502
  • [28] Collusion-resistant convertible ring signature schemes
    Jung Yeon Hwang
    Ku-Young Chang
    Hyun Sook Cho
    Boyeon Song
    Willy Susilo
    Science China Information Sciences, 2015, 58 : 1 - 16
  • [29] Collusion-Resistant Processing of SQL Range Predicates
    Kesarwani, Manish
    Kaul, Akshar
    Singh, Gagandeep
    Deshpande, Prasad M.
    Haritsa, Jayant R.
    DATA SCIENCE AND ENGINEERING, 2018, 3 (04) : 323 - 340
  • [30] Collusion-Resistant Anonymous Data Collection Method
    Ashrafi, Mafruz Zaman
    Ng, See Kiong
    KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2009, : 69 - 77