Skip to main content

Collusion-Resistant Fingerprinting Systems: Review and Recent Results

  • Chapter
Transactions on Data Hiding and Multimedia Security V

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 6010))

Abstract

This paper provides a review of previous work and recent results on the design and analysis of collusion-resistant fingerprinting systems. Collusion attacks examined in previous work are with constant weights for all colluders. Collusion attacks on continuous media (such as audio and video) with time-varying weights are simple to implement, but have never been treated by other researchers. In recent years, we have proposed a new fingerprinting system called MC-CDMA-based fingerprinting since it is inspired by the multi-carrier code division multi-access (MC-CDMA) communication technique. The time-varying collusion attack can be conveniently analyzed by drawing an analogy to the multi-access interference (MAI) problem in a wireless communication system with a time-varying channel response. As a result, many powerful tools from wireless communications can be borrowed to design a collusion-resistant fingerprinting system. They include codeword design, shifted spreading, pilot-based channel estimation, receiver design, etc. Furthermore, we present results on capacity, throughput, and distortion of a colluded media file. Finally, we will mention some open research problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stone, H.S.: Analysis of attacks on image watermarks with randomized coefficients. Technical Report 96-045, NEC Res. Inst. Tech. Princeton, NJ (1996)

    Google Scholar 

  2. Yacobi, Y.: Improved Boneh-Shaw content fingerprinting. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, p. 378. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Liu, K.J.R., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia fingerprinting forensics for traitor tracing. In: Hindawi, EURASIP on Signal Processing and Communications, New York, NY (2005)

    Google Scholar 

  4. Blackley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting long forgiving messages. In: Proc. of Cryptography, Berlin, Heidelberg, pp. 180–189 (1985)

    Google Scholar 

  5. Cha, B.H., Kuo, C.C.J.: Design of collusion-free codes based on MAI-free principle. In: Proc. IEEE Int’l. Conf. Intelligent Information Hiding and Multimedia Signal Processing, Pasadena, CA, December 2006, pp. 639–642 (2006)

    Google Scholar 

  6. Cha, B.H., Kuo, C.C.J.: Design of collusion-free hiding codes using MAI-free principle. In: Proc. IEEE Int’l. Conf. Acoustics, Speech, and Signal Processing, Honolulu, HI, April 2007, pp. 145–148 (2007)

    Google Scholar 

  7. Cha, B.H., Kuo, C.C.J.: Design of multiuser collusion-free hiding codes with delayed embedding. In: Proc. IEEE Int’l. Conf. Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, November 2007, pp. 379–382 (2007)

    Google Scholar 

  8. Cha, B.H., Kuo, C.C.J.: Design and analysis of high-capacity anti-collusion hiding codes. Journal of Circuits, Systems, and Signal Processing 27, 195–211 (2008)

    Article  MathSciNet  Google Scholar 

  9. Cha, B.H., Kuo, C.C.J.: Advanced colluder detection techniques for OSIFT-based hiding codes. In: Proc. IEEE Int’l. Sym. Circuits and Systems, Seattle, Washington, May 2008, pp. 2961–2964 (2008)

    Google Scholar 

  10. Cha, B.H., Kuo, C.C.J.: Analysis of time-varying collusion attacks in fingerprinting systems: capacity and throughput. In: Proc. IEEE Int’l. Sym. Circuits and Systems, Taipei, Taiwan, May 2009, pp. 493–496 (2009)

    Google Scholar 

  11. Cha, B.H., Kuo, C.C.J.: Robust MC-CDMA-based fingerprinting against time-varying collusion attacks. IEEE Transactions on Information Forensics and Security 4, 302–317 (2009)

    Article  Google Scholar 

  12. Kiyavash, N., Moulin, P.: A framework for optimizing nonlinear collusion attack on fingerprinting systems. In: Proc. Conf. Infromation Sciences and Systems, Princeton, NJ (2006)

    Google Scholar 

  13. Kiyavash, N., Moulin, P.: On optimal collusion strategies for fingerprinting. In: Proc. IEEE Int’l. Conf. Acoustics, Speech, and Signal Processing, Toulouse, France, May 2006, pp. 405–408 (2006)

    Google Scholar 

  14. Zhao, H.V., Liu, K.J.R.: Tritor-within-traitor behavior forensics: strategy and risk minimization. IEEE Transactions on Information Forensics and Security 1, 440–456 (2006)

    Article  Google Scholar 

  15. Zhao, H.V., Wu, M., Wang, Z.J., Liu, K.J.R.: Forensic analysis of nonlinear collusion attacks for multimedia fingerpinting. IEEE Transactions on Image Processing 14, 646–661 (2005)

    Article  Google Scholar 

  16. Wang, Z.J., Wu, M., Zhao, H.V., Liu, K.J.R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal mudulation. IEEE Transactions on Image Processing 14, 804–821 (2005)

    Article  Google Scholar 

  17. Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE Transactions on Information Theory 47, 1042–1049 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  18. Wagner, N.R.: Fingerprinting. In: Proc. Symp. Security Privacy, Oakland, CA, April 1983, pp. 18–22 (1983)

    Google Scholar 

  19. Hollmann, H.D.L., van Lint, J.H., Linnartz, J.P., Tolhuizen, L.M.G.M.: On codes with the identifiable parent property. Journal of Combinatorial Theory 82, 121–133 (1998)

    Article  MATH  Google Scholar 

  20. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44, 1897–1905 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  21. Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing traitors. IEEE Transactions on Information Theory 46, 893–910 (2000)

    Article  MATH  Google Scholar 

  22. Tardos, G.: Optimal probabilistic fingerprint coding. In: Proc. ACM symp. Theory Comput., pp. 116–125 (2003)

    Google Scholar 

  23. Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion resistant fingerprinting for multimedia. IEEE Signal Processing Magazine 21, 15–27 (2004)

    Google Scholar 

  24. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)

    Article  Google Scholar 

  25. Li, Z., Trappe, W.: Collusion-resistant fingerprints from WBE sequence sets. In: Proc. IEEE Int’l. Conf. Communications, Seoul, Korea, May 2005, pp. 1336–1340 (2005)

    Google Scholar 

  26. Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing 51, 1069–1087 (2003)

    Article  MathSciNet  Google Scholar 

  27. He, S., Wu, M.: Joint coding and embedding techniques for multimedia fingerprinting. IEEE Transactions on Information Forensics and Security 1, 231–247 (2006)

    Article  Google Scholar 

  28. Tse, D.N.C., Viswanath, P.: Fundamentals of wireless communication. Cambridge University Press, Cambridge (2005)

    MATH  Google Scholar 

  29. Tsai, S.H., Lin, Y.P., Kuo, C.C.J.: A precoded multiuser OFDM (PMU-OFDM) transceiver for time asynchronous systems. In: Proc. IEEE GLOBECOM, St. Louis, MO, November 2005, pp. 2214–2218 (2005)

    Google Scholar 

  30. Tsai, S.H., Lin, Y.P., Kuo, C.C.J.: MAI-free MC-CDMA based on Hadamard-Walsh codes. IEEE Transactions on Signal Processing 54, 3166–3179 (2006)

    Article  Google Scholar 

  31. Giannakis, G.B., Serpedin, E.: Linear multichannel blind equalizers of nonlinear FIR volterra channels. IEEE Transactions on Signal Processing 45, 67–81 (1997)

    Article  Google Scholar 

  32. Tugnait, J.K., Tong, L., Ding, Z.: Single-user channel estimation and equalization. IEEE Signal Processing Magazine 17, 16–28 (2000)

    Article  Google Scholar 

  33. Verdu, S.: Multiuser detection. Cambridge University Press, Cambridge (1998)

    MATH  Google Scholar 

  34. Hanzo, L., Munster, M., Choi, B.J., Keller, T.: OFDM and MC-CDMA for broadband multi-user communications, WLANs and broadcasting. John Wiley & Sons, West Sussex (2004)

    Google Scholar 

  35. Jayant, N., Johnston, J., Safranek, R.: Signal compression based on models of human perception. Proceedings of the IEEE 81, 1385–1422 (1993)

    Article  Google Scholar 

  36. Watson, A.B.: DCT quantization matrices visually optimized for individual images. In: Proc. SPIE, Conf. Human Vision, Visual Processing, and Digital Display, San Jose, CA, USA, February 1993, pp. 202–216 (1993)

    Google Scholar 

  37. Watson, A.B., Yang, G.Y., Solomon, J.A., Villasenor, J.: Visibility of wavelet qunatization noise. IEEE Transactions on Image Processing 6, 1164–1175 (1997)

    Article  Google Scholar 

  38. Podilchuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications 16, 525–539 (1998)

    Article  Google Scholar 

  39. Kirovski, D., Malvar, H.S.: Spread-spectrum watermarking of audio signals. IEEE Transactions on Signal Processing 51, 1020–1033 (2003)

    Article  MathSciNet  Google Scholar 

  40. Liu, Y.W., Smith, J.O.: Audio watermarking through deterministic plus stochastic signal decomposition. EURASIP Journal on Information Security 2007, 1–12 (2007)

    Google Scholar 

  41. Allen, J.B., Rabiner, L.R.: A unified approach to short-time Fourier analaysis and synthesis. Proceedings of the IEEE 65, 1558–1564 (1977)

    Article  Google Scholar 

  42. Princen, J.P., Bradley, A.B.: Analysis/synthesis filter bank design based on time domain aliasing cancellation. IEEE Transactions on Acoustics, Speech, and Signal Processing 86, 1153–1161 (1986)

    Article  Google Scholar 

  43. Tse, D.N.C., Hanly, S.V.: Linear multiuser receivers: effective interference, effective bandwidth and user capacity. IEEE Transactions on Information Theory 45, 641–657 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  44. Proakis, J.G.: Digital Communications. McGraw-Hill, New York (1995)

    Google Scholar 

  45. Sklar, B.: Rayleigh fading channels in mobile digital communications systems part I: characterization. IEEE Communications Magazine, 90–100 (July 1997)

    Google Scholar 

  46. Sklar, B.: Rayleigh fading channels in mobile digital communications systems part II: mitigation. IEEE Communications Magazine, 102–109 (July 1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Cha, BH., Kuo, C.C.J. (2010). Collusion-Resistant Fingerprinting Systems: Review and Recent Results. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security V. Lecture Notes in Computer Science, vol 6010. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14298-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14298-7_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14297-0

  • Online ISBN: 978-3-642-14298-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics