Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In the spread spectrum (SS) fingerprinting technique, the averaging attack has been supposed to be the most damaging attack. It is because a number of nonlinear collusion strategies is supposed to be well approximated by averaging collusion plus additive noise. In this study, we intensively evaluate the conventional assumption, and reveal its drawbacks when a SS sequence is embedded in a digital image. Furthermore, we propose a simple and effective method to improve the drawbacks by introducing a spreading operation at the embedding. Our experimental results reveal that the damages caused by non-linear collusion strategies can be reduced in such a way that the host signal sampled from an image is kept secret.

Original languageEnglish
Title of host publicationProceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages50-54
Number of pages5
ISBN (Electronic)9784885522925
Publication statusPublished - Dec 8 2014
Externally publishedYes
Event2014 International Symposium on Information Theory and Its Applications, ISITA 2014 - Melbourne, Australia
Duration: Oct 26 2014Oct 29 2014

Other

Other2014 International Symposium on Information Theory and Its Applications, ISITA 2014
CountryAustralia
CityMelbourne
Period10/26/1410/29/14

Fingerprint

Additive noise

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Cite this

Kuribayashi, M. (2014). Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting. In Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014 (pp. 50-54). [6979801] Institute of Electrical and Electronics Engineers Inc..

Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting. / Kuribayashi, Minoru.

Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014. Institute of Electrical and Electronics Engineers Inc., 2014. p. 50-54 6979801.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kuribayashi, M 2014, Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting. in Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014., 6979801, Institute of Electrical and Electronics Engineers Inc., pp. 50-54, 2014 International Symposium on Information Theory and Its Applications, ISITA 2014, Melbourne, Australia, 10/26/14.
Kuribayashi M. Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting. In Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014. Institute of Electrical and Electronics Engineers Inc. 2014. p. 50-54. 6979801
Kuribayashi, Minoru. / Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting. Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 50-54
@inproceedings{097aa50a2d2a4e3ca925906cba6c8acf,
title = "Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting",
abstract = "In the spread spectrum (SS) fingerprinting technique, the averaging attack has been supposed to be the most damaging attack. It is because a number of nonlinear collusion strategies is supposed to be well approximated by averaging collusion plus additive noise. In this study, we intensively evaluate the conventional assumption, and reveal its drawbacks when a SS sequence is embedded in a digital image. Furthermore, we propose a simple and effective method to improve the drawbacks by introducing a spreading operation at the embedding. Our experimental results reveal that the damages caused by non-linear collusion strategies can be reduced in such a way that the host signal sampled from an image is kept secret.",
author = "Minoru Kuribayashi",
year = "2014",
month = "12",
day = "8",
language = "English",
pages = "50--54",
booktitle = "Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting

AU - Kuribayashi, Minoru

PY - 2014/12/8

Y1 - 2014/12/8

N2 - In the spread spectrum (SS) fingerprinting technique, the averaging attack has been supposed to be the most damaging attack. It is because a number of nonlinear collusion strategies is supposed to be well approximated by averaging collusion plus additive noise. In this study, we intensively evaluate the conventional assumption, and reveal its drawbacks when a SS sequence is embedded in a digital image. Furthermore, we propose a simple and effective method to improve the drawbacks by introducing a spreading operation at the embedding. Our experimental results reveal that the damages caused by non-linear collusion strategies can be reduced in such a way that the host signal sampled from an image is kept secret.

AB - In the spread spectrum (SS) fingerprinting technique, the averaging attack has been supposed to be the most damaging attack. It is because a number of nonlinear collusion strategies is supposed to be well approximated by averaging collusion plus additive noise. In this study, we intensively evaluate the conventional assumption, and reveal its drawbacks when a SS sequence is embedded in a digital image. Furthermore, we propose a simple and effective method to improve the drawbacks by introducing a spreading operation at the embedding. Our experimental results reveal that the damages caused by non-linear collusion strategies can be reduced in such a way that the host signal sampled from an image is kept secret.

UR - http://www.scopus.com/inward/record.url?scp=84920548829&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84920548829&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84920548829

SP - 50

EP - 54

BT - Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014

PB - Institute of Electrical and Electronics Engineers Inc.

ER -