Advertisement

Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme

  • Hans Georg Schaathun
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5041)

Abstract

We introduce two novel collusion attacks against digital fingerprinting using additive spread-spectrum watermarks. These attacks demonstrate that the He-Wu fingerprinting system is considerably less secure against collusive attacks than suggested by the original paper. In addition to causing error rates above 85% at the decoder with as few as 8 colluders, one of our two attacks give copies with less distortion (measured by Euclidean distance) than the fingerprinted copies originally distributed.

Keywords

Robust Watermark Collusion Attack Watermark Signal Attack Analysis Orthogonal Sequence 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5), 1897–1905 (1998); presented in part at CRYPTO 1995MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    He, S., Wu, M.: Joint coding and embedding techniques for multimedia fingerprinting. IEEE Trans. Information Forensics and Security 1, 231–248 (2006)CrossRefGoogle Scholar
  3. 3.
    Schaathun, H.G., Fernandez-Muüoz, M.: Boneh-Shaw fingerprinting and soft decision decoding. In: Information Theory Workshop, Rotorua, NZ (2005)Google Scholar
  4. 4.
    Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inform. Theory 47(3), 1042–1049 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Tardos, G.: Optimal probabilistic fingerprint codes. Journal of the ACM (2005); In: part at STOC 2003 (to appear), http://www.renyi.hu/~tardos/fingerprint.ps
  6. 6.
    Wagner, N.R.: Fingerprinting. In: Proceedings of the 1983 Symposium on Security and Privacy (1983)Google Scholar
  7. 7.
    Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion resistant fingerprinting for multimedia. IEEE Signal Processing Magazine (2004)Google Scholar
  8. 8.
    Zhao, H., Wu, M., Wang, Z.J., Liu, K.J.R.: Nonlinear collusion attacks on independent fingerprints for multimedia. IEEE Trans. Image Proc., 646–661 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Hans Georg Schaathun
    • 1
  1. 1.Department of ComputingUniversity of SurreyUK

Personalised recommendations