Efficient Anti-Scalable Anti-Collusion Fingerprinting

Digital fingerprinting schemes are techniques to protect the copyright of digital contents. One of the important problems is a collusion attack such that several users combine their copies of a same content to modify or delete the embedded fingerprint. Trappe et al. proposed the AND anti-collusion codes (AND-ACC) against the average attack. However, the scheme is vulnerable to linear combination attack (LCCA) and cannot support a large number of users. For this last issue, Seol and Kim highlighted a code (called SK) by extending the AND-ACC. Unfortunately, that code is weak against majority attack and LCCA. In this paper, we improve the SK scheme by adding to each group the subcode. The new code can resist average attack when the inter-group collusion is less likely than intragroup collusion due to geographic conditions. Non-blind detection statistics with the knowledge of the host and soft-threshold detection are used to identify colluders within each guilty group. Our model increases the probability of tracing )) ( log ( 1 N n O  colluders within each guilty group, where N is the fingerprinting length and n is the number of users in each group. Experiment results on the real images show that our code is robust to average attack.

[1]  Min Wu,et al.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.

[2]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[3]  Ahmad Reza Naghsh-Nilchi,et al.  Robust Digital Image Watermarking Based on Joint DWT-DCT , 2009, J. Digit. Content Technol. its Appl..

[4]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[5]  Yingwei Yao Colluder Detection for Nonlinear Collusion Attacks , 2006, 2006 Fortieth Asilomar Conference on Signals, Systems and Computers.

[6]  Zhigang Zhao,et al.  Collusion attack to a scalable AND-ACC fingerprinting scheme , 2007, Electronic Imaging.

[7]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[8]  Jae-min Seol,et al.  A scalable AND-ACC fingerprinting scheme for practical contents distribution , 2005, Visual Communications and Image Processing.

[9]  Min Wu,et al.  Resistance of orthogonal Gaussian fingerprints to collusion attacks , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[10]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[11]  Herbert S. Wilf The Redheffer Matrix of a Partially Ordered Set , 2004, Electron. J. Comb..

[12]  Min Wu,et al.  Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.

[13]  Fadhil Salman Abed,et al.  A Proposed Technique for Information Hiding Based on DCT , 2010, Int. J. Adv. Comp. Techn..

[14]  Coniferous softwood GENERAL TERMS , 2003 .