2016
DOI: 10.1587/transinf.2015mup0005
|View full text |Cite
|
Sign up to set email alerts
|

Simple Countermeasure to Non-Linear Collusion Attacks Targeted for Spread-Spectrum Fingerprinting Scheme

Abstract: SUMMARYBased upon the Kerckhoffs' principle, illegal users can get to know the embedding and detection algorithms except for a secret key. Then, it is possible to access to a host signal which may be selected from frequency components of a digital content for embedding watermark signal. Especially for a fingerprinting scheme which embeds user's information as a watermark, the selected components can be easily found by the observation of differently watermarked copies of a same content. In this scenario, it is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
2
1

Relationship

3
0

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…To our knowledge, there is only one technique which claims to thwart both the MMX and uniform attacks, namely the obfuscation described in [Kur16,KS15]. Previous works have applied obfuscation as one of several advanced features in a complex system, and evaluated the complete system only.…”
Section: Modulation and Obfuscationmentioning
confidence: 99%
“…To our knowledge, there is only one technique which claims to thwart both the MMX and uniform attacks, namely the obfuscation described in [Kur16,KS15]. Previous works have applied obfuscation as one of several advanced features in a complex system, and evaluated the complete system only.…”
Section: Modulation and Obfuscationmentioning
confidence: 99%
“…In order to prevent colluders from accessing the host signal, a spreading operation was introduced at the embedding procedure in [8]. According to a secret key, a PN-sequence ρ t ∈ {±1} is generated.…”
Section: Obfuscationmentioning
confidence: 99%
“…Under the Kerckhoffs' principle [6], it is not difficult for colluders to access to the raw channel [7]. In order to prevent colluders from analyzing the components selected for embedding, an obfuscation technique presented in [8] can be utilized at the feature selection. It makes difficult for colluders to derive the components for embedding without a secret key even if they collect many copies.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation