A Note on the Limits of Collusion-Resistant Watermarks

In one proposed use of digital watermarks, the owner of a document D sells slightly different documents, D1;D2;,... to each buyer; if a buyer posts his/her document Di to the web, the owner can identify the source of the leak. More general attacks are however possible in which k buyers create some composite document D*; the goal of the owner is to identify at least one of the conspirators. We show, for a reasonable model of digital watermarks, fundamental limits on their efficacy against collusive attacks. In particular, if the effective document length is n, then at most O(√n= ln n) adversaries can defeat any watermarking scheme. Our attack is, in the theoretical model, oblivious to the watermarking scheme being used; in practice, it uses very little information about the watermarking scheme. Thus, using a proprietary system seems to give only a very weak defense.

[1]  Moni Naor,et al.  Digital signets: self-enforcing protection of digital information (preliminary version) , 1996, STOC '96.

[2]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[3]  Birgit Pfitzmann,et al.  Asymmetric fingerprinting , 1996 .

[4]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.

[5]  Moni Naor,et al.  Threshold Traitor Tracing , 1998, CRYPTO.

[6]  Birgit Pfitzmann,et al.  Asymmetric Fingerprinting (Extended Abstract) , 1996, EUROCRYPT.

[7]  Robert E. Tarjan,et al.  Resistance of digital watermarks to collusive attacks , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[8]  Birgit Pfitzmann,et al.  Asymmetric fingerprinting for larger collusions , 1997, CCS '97.

[9]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[10]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[11]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[12]  Birgit Pfitzmann,et al.  Trials of Traced Traitors , 1996, Information Hiding.

[13]  Birgit Pfitzmann,et al.  Anonymous Fingerprinting , 1997, EUROCRYPT.