Digital signets: self-enforcing protection of digital information (preliminary version)
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Proceedings of the First International Workshop on Information Hiding
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Multimedia content screening using a dual watermarking and fingerprinting system
Proceedings of the tenth ACM international conference on Multimedia
Improved Boneh-Shaw Content Fingerprinting
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
A Robust Block Oriented Watermarking Scheme in Spatial Domain
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Efficient Watermark Detection and Collusion Security
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Collusion Secure q-ary Fingerprinting for Perceptual Content
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
A Dual Watermark-Fingerprint System
IEEE MultiMedia
Fingerprinting and forensic analysis of multimedia
Proceedings of the 12th annual ACM international conference on Multimedia
Building efficient and effective multimedia fingerprints via joint coding and embedding
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Collusion secure convolutional fingerprinting information codes
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Resistance of orthogonal Gaussian fingerprints to collusion attacks
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 2
Group-oriented fingerprinting for multimedia forensics
EURASIP Journal on Applied Signal Processing
A Bootstrap Attack on Digital Watermarks in the Frequency Domain
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Regular simplex fingerprints and their optimality properties
IEEE Transactions on Information Forensics and Security
Improving a Digital Rights Management Scheme for Video Broadcast
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Fingercasting-joint fingerprinting and decryption of broadcast messages
Transactions on data hiding and multimedia security II
An estimation attack on content-based video fingerprinting
Transactions on data hiding and multimedia security II
Tracing stateful pirate decoders
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Impact of rounding error on spread spectrum fingerprinting scheme
IEEE Transactions on Information Forensics and Security
Cryptanalysis of “wavelet tree quantization” watermarking scheme
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
Collusion secure convolutional spread spectrum fingerprinting
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Performance study on multimedia fingerprinting employing traceability codes
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Regular simplex fingerprints and their optimality properties
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Cryptanalysis of barni et al. watermarking scheme
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Cryptanalysis of a wavelet based watermarking scheme
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Security evaluation of generalized patchwork algorithm from cryptanalytic viewpoint
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Fingercasting—Joint fingerprinting and decryption of broadcast messages
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
An Authentication Technique for Image/Legal Document (ATILD)
Journal of Signal Processing Systems
A collusion attack optimization strategy for digital fingerprinting
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) - Special Issue on Multimedia Security
Feedback-driven binary code diversification
ACM Transactions on Architecture and Code Optimization (TACO) - Special Issue on High-Performance Embedded Architectures and Compilers
Hi-index | 0.00 |
In one proposed use of digital watermarks, the owner of a document D sells slightly different documents, D1;D2;,... to each buyer; if a buyer posts his/her document Di to the web, the owner can identify the source of the leak. More general attacks are however possible in which k buyers create some composite document D*; the goal of the owner is to identify at least one of the conspirators. We show, for a reasonable model of digital watermarks, fundamental limits on their efficacy against collusive attacks. In particular, if the effective document length is n, then at most O(√n= ln n) adversaries can defeat any watermarking scheme. Our attack is, in the theoretical model, oblivious to the watermarking scheme being used; in practice, it uses very little information about the watermarking scheme. Thus, using a proprietary system seems to give only a very weak defense.