Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks

Multimedia social network is a network infrastructure in which the social network users share multimedia contents with all different purposes. Analyzing user behavior in multimedia social networks helps design more secured and efficient multimedia and networking systems. Multimedia fingerprinting protects multimedia from illegal alterations and multiuser collusion is a cost-effective attack. The colluder social network is naturally formed during multiuser collusion with which colluders gain reward by redistributing the colluded multimedia contents. Since the colluders have conflicting interest, the maximal-payoff collusion for one colluder may not be the maximal-payoff collusion for others. Hence, before a collusion being successful, the colluders must bargain with each other to reach agreements. We first model the bargaining behavior among colluders as a noncooperative game and study four different bargaining solutions of this game. Moreover, the market value of the redistributed multimedia content is often time-sensitive. The earlier the colluded copy being released, the more the people are willing to pay for it. Thus, the colluders have to reach agreements on how to distribute reward and risk among themselves as soon as possible. This paper further incorporates this time-sensitiveness of the colluders' reward and studies the time-sensitive bargaining equilibrium. The study in this paper reveals the strategies that are optimal for the colluders; thus, all the colluders have no inventive to disagree. Such understanding reduces the possible types of collusion into a small finite set.

[1]  Yao Wang,et al.  Video Processing and Communications , 2001 .

[2]  K. J. Ray Liu,et al.  Behavior forensics with side information for multimedia fingerprinting social networks , 2009, IEEE Transactions on Information Forensics and Security.

[3]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[4]  K. J. Ray Liu,et al.  Multimedia Fingerprinting Forensics for Traitor Tracing , 2005 .

[5]  Francis Zane Efficient Watermark Detection and Collusion Security , 2000, Financial Cryptography.

[6]  Min Wu,et al.  Group-Oriented Fingerprinting for Multimedia Forensics , 2004, EURASIP J. Adv. Signal Process..

[7]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[8]  K. J. Ray Liu,et al.  Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization , 2006, IEEE Transactions on Information Forensics and Security.

[9]  K.J.R. Liu,et al.  Behavior modeling and forensics for multimedia social networks , 2009, IEEE Signal Processing Magazine.

[10]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.

[11]  Jörg Schwenk,et al.  Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.

[12]  Darko Kirovski,et al.  Bounded Gaussian fingerprints and the gradient collusion attack [multimedia fingerprinting applications] , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[13]  Jean-Luc Dugelay,et al.  Exploiting self-similarities to defeat digital watermarking systems: a case study on still images , 2004, MM&Sec '04.

[14]  Yan Sun,et al.  “ Network-Aware Security for Group Communications ” , 2010 .

[15]  Min Wu,et al.  Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.

[16]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[17]  Min Wu,et al.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.

[18]  K. J. Ray Liu,et al.  Scalable multimedia fingerprinting forensics with side information , 2006, 2006 International Conference on Image Processing.

[19]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[20]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[21]  Min Wu,et al.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.

[22]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[23]  K. J. Ray Liu,et al.  Behavior forensics for scalable multiuser collusion: fairness versus effectiveness , 2006, IEEE Transactions on Information Forensics and Security.