Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game

Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. To develop an efficient collusion-resistant fingerprinting scheme, it is very important for the system designer to understand how the behavior dynamics of colluders affect the performance of collusion attack. In the literature, little effort has been made to explicitly study the relationship between risk, e.g., the probability of the colluders to be detected, and the distortion of the colluded signal. In this paper, we investigate the risk-distortion relationship for the linear video collusion attack with Gaussian fingerprint. We formulate the optimal linear collusion attack as an optimization problem of finding the optimal collusion parameters to minimize the distortion subject to a risk constraint. By varying the risk constraint and solving the corresponding optimization problem, we can derive the optimal risk-distortion curve. Moreover, based upon the observation that the detector/attacker can each improve the detection/attack performance with the knowledge of his/her opponent's strategy, we formulate the attack and detection problem as a dynamic mouse and cat game and study the optimal strategies for both the attacker and detector. We show that if the detector uses a fixed detection strategy, the attacker can estimate the detector's strategy and choose the corresponding optimal strategy to attack the fingerprinted video with a small distortion. However, if the detector is powerful, i.e., the detector can always estimate the attacker's strategy, the best strategy for the attacker is the min-max strategy. Finally, we conduct several experiments to verify the proposed risk-distortion model using real video data.

[1]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[2]  H. Vincent Poor,et al.  An introduction to signal detection and estimation (2nd ed.) , 1994 .

[3]  Deepa Kundur,et al.  Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.

[4]  Yongdong Wu Nonlinear collusion attack on a watermarking scheme for buyer authentication , 2006, IEEE Trans. Multim..

[5]  Bernd Girod,et al.  Capacity of digital watermarks subjected to an optimal collusion attack , 2000, 2000 10th European Signal Processing Conference.

[6]  Min Wu,et al.  Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia , 2007, 2007 IEEE International Conference on Image Processing.

[7]  K. J. Ray Liu,et al.  Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization , 2006, IEEE Transactions on Information Forensics and Security.

[8]  Deepa Kundur,et al.  Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance , 2005, IEEE Transactions on Multimedia.

[9]  Min Wu,et al.  Collusion-resistant fingerprinting for multimedia , 2002, IEEE Signal Processing Magazine.

[10]  Min Wu,et al.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.

[11]  Hayder Radha,et al.  Statistical analysis and distortion modeling of MPEG-4 FGS , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[12]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[13]  Min Wu,et al.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.

[14]  K. J. Ray Liu,et al.  Behavior forensics for scalable multiuser collusion: fairness versus effectiveness , 2006, IEEE Transactions on Information Forensics and Security.

[15]  K. J. Ray Liu,et al.  Multimedia Fingerprinting Forensics for Traitor Tracing , 2005 .

[16]  Tihao Chiang,et al.  A new rate control scheme using quadratic rate distortion model , 1997, IEEE Trans. Circuits Syst. Video Technol..

[17]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[18]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[19]  Thomas Hofmann,et al.  Kernel Methods for Missing Variables , 2005, AISTATS.

[20]  James T. Kwok,et al.  A regularization framework for multiple-instance learning , 2006, ICML.