Access Restriction

Author Liu, K. J. Ray ♦ Zhao, H. Vicky
Source CiteSeerX
Content type Text
File Format PDF
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Fingerprinted Copy ♦ Device Heterogeneity ♦ Multimedia Forensics ♦ Several Attacker ♦ Index Term Security ♦ Scalable Multimedia Forensic System ♦ Multiuser Collusion Attack ♦ Received Copy ♦ Multimedia System ♦ Important Issue ♦ Hinder Traitor ♦ Identifying Fingerprint ♦ Selfish Colluders ♦ Multi-user Collusion ♦ Different Quality ♦ Video Signal Processing ♦ High Resolution ♦ Selfish Colluder ♦ Cost Effective Attack
Abstract A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying fingerprints and hinder traitor tracing. An important issue in collusion is to ensure that all colluders have the same probability of being detected. While they might agree so, some selfish colluders may wish to further lower their own risk of being caught. This paper investigates this problem of "traitors within traitors", in an effort to formulate the dynamics among attackers during collusion. We consider scalable multimedia forensic systems where users receive fingerprinted copies of different quality due to network and device heterogeneity, and explore the techniques that a selfish colluder can use to minimize his/her probability of being detected. Our results show that changing the resolution of their received copies before multi-user collusion can help selfish colluders further reduce their risk, especially when the colluded copy has high resolution. Index Terms- security, multimedia systems, video signal processing 1.
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Learning Resource Type Article