Attack Analysis for He & Wu's Joint Watermarking/Fingerprinting Scheme
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Performance study and improvement on ECC-based binary anti-collusion forensic code for multimedia
Proceedings of the 11th ACM workshop on Multimedia and security
Robust MC-CDMA-based fingerprinting against time-varying collusion attacks
IEEE Transactions on Information Forensics and Security
Fingerprinting compressed multimedia signals
IEEE Transactions on Information Forensics and Security
High-rate random-like spherical fingerprinting codes with linear decoding complexity
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Behavior forensics with side information for multimedia fingerprinting social networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
An estimation attack on content-based video fingerprinting
Transactions on data hiding and multimedia security II
Collusion-resistant fingerprinting scheme based on the CDMA-technique
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Collusion-resistant fingerprinting systems: review and recent results
Transactions on data hiding and multimedia security V
Impact of rounding error on spread spectrum fingerprinting scheme
IEEE Transactions on Information Forensics and Security
Interleaving embedding scheme for ECC-based multimedia fingerprinting
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
A novel collusion attack strategy for digital fingerprinting
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Asymptotically false-positive-maximizing attack on non-binary tardos codes
IH'11 Proceedings of the 13th international conference on Information hiding
Accusation probabilities in Tardos codes: beyond the Gaussian approximation
Designs, Codes and Cryptography
A collusion attack optimization strategy for digital fingerprinting
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) - Special Issue on Multimedia Security
Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization
Journal of Systems and Software
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Digital fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. The collusion attack is a powerful attack where several different fingerprinted copies of the same content are combined together to attenuate or even remove the fingerprints. One major category of collusion-resistant fingerprinting employs an explicit step of coding. Most existing works on coded fingerprinting mainly focus on the code-level issues and treat the embedding issues through abstract assumptions without examining the overall performance. In this paper, we jointly consider the coding and embedding issues for coded fingerprinting systems and examine their performance in terms of collusion resistance, detection computational complexity, and distribution efficiency. Our studies show that coded fingerprinting has efficient detection but rather low collusion resistance. Taking advantage of joint coding and embedding, we propose a permuted subsegment embedding technique and a group-based joint coding and embedding technique to improve the collusion resistance of coded fingerprinting while maintaining its efficient detection. Experimental results show that the number of colluders that the proposed methods can resist is more than three times as many as that of the conventional coded fingerprinting approaches.