DOI QR코드

DOI QR Code

Traitor Traceability of Colluded Multimedia Fingerprinting code Using Hamming Distance on XOR Collusion Attack

XOR 공모공격에서 해밍거리를 이용한 공모된 멀티미디어 핑거프린팅 코드의 부정자 추적

  • Received : 2013.03.04
  • Published : 2013.07.25

Abstract

For the traitor tracing of multimedia content, this paper presents the classification algorithm of XOR collusion attack types using hamming distance, which applies to the colluded fingerprinting codes. The conventional traitor decision hinges on the colluded fingerprinting code used by a correlation coefficient, but the proposed scheme uses hamming distance. While XOR collusion attack employing a correlation coefficient is impossible to trace the traitors about 50% colluders due to a serious XOR linear problem, our method improves the performance of traceability to trace at least 1 traitor using hamming distance, and thus, the functional behavior of the proposed traitor traceability is coincided with Probability Scheme.

본 논문에서는 멀티미디어 콘텐츠의 부정자를 추적하기 위하여, 공모된 핑거프린팅 코드를 해밍거리를 이용하여 XOR 공모공격을 분류하는 알고리즘을 제안한다. 기존의 공모된 핑거프린팅 코드는 상관관계수를 이용하여 부정자를 판정하였지만 제안된 방법은 해밍거리를 이용하였다. 그 결과 상관관계 계수에 의한 XOR 공모공격은 XOR의 심각한 선형문제 때문에 50% 정도의 공모자 수에서 불가능 했던 부정자 추적이 해밍거리를 이용하여 최소한 1명의 부정자를 추적할 수 있는 추적도의 성능을 향상시켰으므로, 제안된 부정자 추적의 기능동작은 Probabilistic Scheme에 부합하였다.

Keywords

References

  1. Minoru Kuribayashi, "Recent Fingerprinting Techniques with Cryptographic Protocol," www.intechopen.com, Signal Processing, Ch. 10, pp. 197-206, 2010.
  2. Min Wu, Wade Trappe, Z. Jane Wang, and K. J. Ray Liu, "Collusion-resistant fingerprinting for multimedia," IEEE Signal Processing Magazine, pp.15-27, Mar. 2004.
  3. Yu-Tzu Lin and Ja-Ling Wu, "Practical fingerprinting system for images," Optical Engineering 46(5), 057004, May 2007. https://doi.org/10.1117/1.2740765
  4. R. Safavi-Naini and Y. Wang, "New results on frame-proof codes and traceability schemes," IEEE Trans. Inform. Theory, vol. 47, no. 11, pp. 3029-3033, Nov. 2001. https://doi.org/10.1109/18.959283
  5. J. N. Staddon, D. R. Stinson, and R. Wei, "Combinatorial properties of frameproof and traceability codes," IEEE Trans. Inform. Theory, vol. 47, no. 3, pp. 1042-1049, Mar. 2001. https://doi.org/10.1109/18.915661
  6. D. R. Stinson and R. Wei, "Combinatorial properties and constructions of traceability schemes and frameproof codes," SIAMJ. Discrete Math., vol. 11, pp. 41-53, Feb. 1998. https://doi.org/10.1137/S0895480196304246
  7. W. Trappe, M. Wu, J. Z. Wang, and K. J. R. Liu, "Anti-collusion fingerprinting for multimedia," IEEE Trans. on Signal Processing, Vol. 51, No. 3, pp. 1069-1087, 2003. https://doi.org/10.1109/TSP.2003.809378
  8. Yongdong Wu and Zhigang Zhao, "Collusion attack to a scalable AND-ACC fingerprinting scheme," Proc. SPIE 6508, Visual Communications and Image Processing, January 29, 2007.
  9. Block Design, http://mathworld.wolfram.com/BlockDesign.html, 2012.08 참조
  10. D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Tran. on Information Theory, vol. 44, pp. 1897-1905, Sept. 1998. https://doi.org/10.1109/18.705568
  11. Kang Hyeon RHEE, "Detection on the Shift Operation of Multimedia Fingerprinting Code using PCA Method," International Journal of Information Processing and Management(IJIPM), Vol. 3, No. 2, pp.1-6, April 2012.
  12. Xin Huang and Hongwei Lv, "A C-secure Digital Fingerprinting Scheme Combined with Error-Correcting Code," Multimedia Information Networking and Security (MINES), 2011 Third International Conference on, pp. 297-299, 2011.
  13. Minquan Cheng and Ying Miao, "On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting," IEEE Transactions on Information Theory, Vol. 57, Issue: 7, pp. 4843-4851, 2011. https://doi.org/10.1109/TIT.2011.2146130
  14. Yongsheng Yu, Jinshu Cheng, Zhihua Wei and Ruhan He, "A scheme of betrayal checking and traitor tracing for confidential image in Internet," Measurement, Information and Control (MIC), 2012 International Conference on, Vol. 2, pp. 572-575, 2012.
  15. Fen Liu, Gui Zhang, "Analysis of Set-cover traitor tracing scheme," Consumer Communications and Networking Conference (CCNC), 2012 IEEE, pp. 512-517, 2012.
  16. Y. Wu, "Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting," Proc ICASSP 05, vol. 2, pp. 13-16, Mar. 2005.
  17. 이강현, "BIBD 기반의 멀티미디어 핑거프린팅 코드의 공모코드들에 대한 공모자 추적," 대한전자공학회, 전자공학회논문지-CI, 제46권 제6호, pp. 79-86, 2009.
  18. 이강현, "신경망을 이용한 멀티미디어 핑거프린팅의 XOR-ACC 구현," 대한전자공학회, 전자공학회 논문지-CI, 제48권 제6호, pp. 1-8, 2011.
  19. Laarhoven T., Oosterwijk J. and Doumen, J. "Dynamic traitor tracing for arbitrary alphabets: Divide and conquer," Information Forensics and Security (WIFS), 2012 IEEE International Workshop on, pp. 240-245, 2012.
  20. Shan He and Min Wu, "Performance Study on Multimedia Fingerprinting Employing Traceability Codes," DIGITAL WATERMARKING, Lecture Notes in Computer Science, Vol. 3710/2005, pp. 84-96, 2005.
  21. Jeffrey H. Dinitz and Douglas R. Stinson, "Contemporary Design Theory: A Collection of Surveys," Wiley, 1992.

Cited by

  1. Median Filtering Detection using Latent Growth Modeling vol.52, pp.1, 2015, https://doi.org/10.5573/ieie.2015.52.1.061