Linear combination collusion attack and its application on an anti-collusion fingerprinting [image watermarking]

This paper presents a linear combination collusion attack (LCCA) which is a generalization of the average attack model. LCCA generates a pirated image of good quality but prevents traitors from being identified. As an application example, LCCA is used to attack a fingerprinting scheme published in IEEE Transactions on Signal Processing. The theoretical analysis and experiment results demonstrate that the attack is practical and efficient.

[1]  Douglas R. Stinson,et al.  Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..

[2]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[3]  Deepa Kundur,et al.  Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.

[4]  Darko Kirovski,et al.  Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.

[5]  Amos Fiat,et al.  Tracing Traitors , 1994, CRYPTO.

[6]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[7]  John G. Proakis,et al.  Digital Communications , 1983 .

[8]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.

[9]  Matthew K. Franklin,et al.  An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.

[10]  Michael W. Marcellin,et al.  JPEG2000 - image compression fundamentals, standards and practice , 2002, The Kluwer International Series in Engineering and Computer Science.

[11]  Moni Naor,et al.  Threshold Traitor Tracing , 1998, CRYPTO.

[12]  A. Murat Tekalp,et al.  Collusion-resilient fingerprinting using random prewarping , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[13]  Robert H. Deng,et al.  Adaptive Collusion Attack to a Block Oriented Watermarking Scheme , 2003, ICICS.

[14]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[15]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[16]  Min Wu,et al.  Nonlinear collusion attacks on independent fingerprints for multimedia , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[17]  Birgit Pfitzmann,et al.  Trials of Traced Traitors , 1996, Information Hiding.

[18]  Yongdong Wu,et al.  An Attack on A Traitor Tracing Scheme , 2001, IACR Cryptol. ePrint Arch..

[19]  Yevgeniy Dodis,et al.  Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack , 2003, Public Key Cryptography.