Iterative Detection Method for CDMA-Based Fingerprinting Scheme
Information Hiding
A Bootstrap Attack on Digital Watermarks in the Frequency Domain
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Robust MC-CDMA-based fingerprinting against time-varying collusion attacks
IEEE Transactions on Information Forensics and Security
Fingerprinting compressed multimedia signals
IEEE Transactions on Information Forensics and Security
A study of traceability of CDMA-based fingerprinting scheme
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Video steganalysis using motion estimation
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
Behavior forensics with side information for multimedia fingerprinting social networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Collusion-resistant fingerprinting scheme based on the CDMA-technique
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Risk-distortion analysis for video collusion attacks: a mouse-and-cat game
IEEE Transactions on Image Processing
Optimal collusion attack for digital fingerprinting
Proceedings of the international conference on Multimedia
Video copy detection: sequence matching using hypothesis test
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Collusion-resistant fingerprinting systems: review and recent results
Transactions on data hiding and multimedia security V
IEEE Transactions on Information Forensics and Security
Impact of rounding error on spread spectrum fingerprinting scheme
IEEE Transactions on Information Forensics and Security
A novel collusion attack strategy for digital fingerprinting
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
Collusion resistant fingerprinting of digital audio
Proceedings of the 4th international conference on Security of information and networks
Collusion, MPEG4 compression and frame dropping resistant video watermarking
Multimedia Tools and Applications
Novel blind video forgery detection using markov models on motion residue
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part III
Impersonator identification through dynamic fingerprinting
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A collusion attack optimization strategy for digital fingerprinting
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) - Special Issue on Multimedia Security
A high capacity and strong robust fingerprinting for compressed images
Computers and Electrical Engineering
Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization
Journal of Systems and Software
A simple tracing algorithm for binary fingerprinting code under averaging attack
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.01 |
Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Unique identification information is embedded into each distributed copy of multimedia signal and serves as a digital fingerprint. Collusion attack is a cost-effective attack against digital fingerprinting, where colluders combine several copies with the same content but different fingerprints to remove or attenuate the original fingerprints. In this paper, we investigate the average collusion attack and several basic nonlinear collusions on independent Gaussian fingerprints, and study their effectiveness and the impact on the perceptual quality. With unbounded Gaussian fingerprints, perceivable distortion may exist in the fingerprinted copies as well as the copies after the collusion attacks. In order to remove this perceptual distortion, we introduce bounded Gaussian-like fingerprints and study their performance under collusion attacks. We also study several commonly used detection statistics and analyze their performance under collusion attacks. We further propose a preprocessing technique of the extracted fingerprints specifically for collusion scenarios to improve the detection performance.