Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation

Digital fingerprinting is a method for protecting digital data in which fingerprints that are embedded in multimedia are capable of identifying unauthorized use of digital content. A powerful attack that can be employed to reduce this tracing capability is collusion, where several users combine their copies of the same content to attenuate/remove the original fingerprints. In this paper, we study the collusion resistance of a fingerprinting system employing Gaussian distributed fingerprints and orthogonal modulation. We introduce the maximum detector and the thresholding detector for colluder identification. We then analyze the collusion resistance of a system to the averaging collusion attack for the performance criteria represented by the probability of a false negative and the probability of a false positive. Lower and upper bounds for the maximum number of colluders K/sub max/ are derived. We then show that the detectors are robust to different collusion attacks. We further study different sets of performance criteria, and our results indicate that attacks based on a few dozen independent copies can confound such a fingerprinting system. We also propose a likelihood-based approach to estimate the number of colluders. Finally, we demonstrate the performance for detecting colluders through experiments using real images.

[1]  Francis Zane Efficient Watermark Detection and Collusion Security , 2000, Financial Cryptography.

[2]  Robert E. Tarjan,et al.  Resistance of digital watermarks to collusive attacks , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[3]  Yacov Yacobi,et al.  Improved Boneh-Shaw Content Fingerprinting , 2001, CT-RSA.

[4]  Hua Wang,et al.  A secure multicast protocol with copyright protection , 2002, CCRV.

[5]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[6]  Birgit Pfitzmann,et al.  Anonymous Fingerprinting , 1997, EUROCRYPT.

[7]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..

[8]  Birgit Pfitzmann,et al.  Asymmetric fingerprinting for larger collusions , 1997, CCS '97.

[9]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[10]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[11]  Hui Cheng,et al.  Robust content-dependent high-fidelity watermark for tracking in digital cinema , 2003, IS&T/SPIE Electronic Imaging.

[12]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[13]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[14]  Josep Domingo-Ferrer,et al.  Simple collusion-secure fingerprinting schemes for images , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[15]  Jörg Schwenk,et al.  Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.

[16]  Frank Boland,et al.  Watermarking digital images for copyright protection , 1995 .

[17]  Min Wu,et al.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.

[18]  Min Wu,et al.  Group-Oriented Fingerprinting for Multimedia Forensics , 2004, EURASIP J. Adv. Signal Process..

[19]  Min Wu,et al.  Collusion-resistant fingerprinting for multimedia , 2004 .

[20]  E. L. Lehmann,et al.  Theory of point estimation , 1950 .

[21]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.

[22]  Min Wu,et al.  Rotation-, scale-, and translation-resilient public watermarking for images , 2000, Electronic Imaging.

[23]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[24]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[25]  Bernd Girod,et al.  Capacity of digital watermarks subjected to an optimal collusion attack , 2000, 2000 10th European Signal Processing Conference.

[26]  Min Wu,et al.  Multimedia Data Hiding , 2003, Springer New York.

[27]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[28]  Ton Kalker,et al.  A Reliability Model for the Detection of Electronic Watermarks in Digital Images; Symposium on Communications and Vehicular Technology (5th) Held in Enschede, The Netherlands on Oct 1997 , 1997 .

[29]  Sushil Jajodia,et al.  Recovery of Watermarks from Distorted Images , 1999, Information Hiding.

[30]  Narayanaswamy Balakrishnan,et al.  Order statistics : theory & methods , 1998 .