Browse > Article
http://dx.doi.org/10.5573/ieek.2013.50.7.175

Traitor Traceability of Colluded Multimedia Fingerprinting code Using Hamming Distance on XOR Collusion Attack  

Chung, Il Yong (Dept. of Computer Eng., Chosun University)
Rhee, Kang Hyeon (Dept. of Electronics Eng., Chosun University)
Publication Information
Journal of the Institute of Electronics and Information Engineers / v.50, no.7, 2013 , pp. 175-180 More about this Journal
Abstract
For the traitor tracing of multimedia content, this paper presents the classification algorithm of XOR collusion attack types using hamming distance, which applies to the colluded fingerprinting codes. The conventional traitor decision hinges on the colluded fingerprinting code used by a correlation coefficient, but the proposed scheme uses hamming distance. While XOR collusion attack employing a correlation coefficient is impossible to trace the traitors about 50% colluders due to a serious XOR linear problem, our method improves the performance of traceability to trace at least 1 traitor using hamming distance, and thus, the functional behavior of the proposed traitor traceability is coincided with Probability Scheme.
Keywords
Multimedia fingerprinting; Traitor traceability; Hamming distance; XOR collusion attack;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Minoru Kuribayashi, "Recent Fingerprinting Techniques with Cryptographic Protocol," www.intechopen.com, Signal Processing, Ch. 10, pp. 197-206, 2010.
2 Min Wu, Wade Trappe, Z. Jane Wang, and K. J. Ray Liu, "Collusion-resistant fingerprinting for multimedia," IEEE Signal Processing Magazine, pp.15-27, Mar. 2004.
3 Yu-Tzu Lin and Ja-Ling Wu, "Practical fingerprinting system for images," Optical Engineering 46(5), 057004, May 2007.   DOI   ScienceOn
4 R. Safavi-Naini and Y. Wang, "New results on frame-proof codes and traceability schemes," IEEE Trans. Inform. Theory, vol. 47, no. 11, pp. 3029-3033, Nov. 2001.   DOI   ScienceOn
5 J. N. Staddon, D. R. Stinson, and R. Wei, "Combinatorial properties of frameproof and traceability codes," IEEE Trans. Inform. Theory, vol. 47, no. 3, pp. 1042-1049, Mar. 2001.   DOI   ScienceOn
6 D. R. Stinson and R. Wei, "Combinatorial properties and constructions of traceability schemes and frameproof codes," SIAMJ. Discrete Math., vol. 11, pp. 41-53, Feb. 1998.   DOI   ScienceOn
7 W. Trappe, M. Wu, J. Z. Wang, and K. J. R. Liu, "Anti-collusion fingerprinting for multimedia," IEEE Trans. on Signal Processing, Vol. 51, No. 3, pp. 1069-1087, 2003.   DOI   ScienceOn
8 Yongdong Wu and Zhigang Zhao, "Collusion attack to a scalable AND-ACC fingerprinting scheme," Proc. SPIE 6508, Visual Communications and Image Processing, January 29, 2007.
9 Block Design, http://mathworld.wolfram.com/BlockDesign.html, 2012.08 참조
10 D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Tran. on Information Theory, vol. 44, pp. 1897-1905, Sept. 1998.   DOI   ScienceOn
11 Kang Hyeon RHEE, "Detection on the Shift Operation of Multimedia Fingerprinting Code using PCA Method," International Journal of Information Processing and Management(IJIPM), Vol. 3, No. 2, pp.1-6, April 2012.
12 Xin Huang and Hongwei Lv, "A C-secure Digital Fingerprinting Scheme Combined with Error-Correcting Code," Multimedia Information Networking and Security (MINES), 2011 Third International Conference on, pp. 297-299, 2011.
13 Minquan Cheng and Ying Miao, "On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting," IEEE Transactions on Information Theory, Vol. 57, Issue: 7, pp. 4843-4851, 2011.   DOI   ScienceOn
14 Yongsheng Yu, Jinshu Cheng, Zhihua Wei and Ruhan He, "A scheme of betrayal checking and traitor tracing for confidential image in Internet," Measurement, Information and Control (MIC), 2012 International Conference on, Vol. 2, pp. 572-575, 2012.
15 Fen Liu, Gui Zhang, "Analysis of Set-cover traitor tracing scheme," Consumer Communications and Networking Conference (CCNC), 2012 IEEE, pp. 512-517, 2012.
16 Y. Wu, "Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting," Proc ICASSP 05, vol. 2, pp. 13-16, Mar. 2005.
17 Shan He and Min Wu, "Performance Study on Multimedia Fingerprinting Employing Traceability Codes," DIGITAL WATERMARKING, Lecture Notes in Computer Science, Vol. 3710/2005, pp. 84-96, 2005.
18 이강현, "BIBD 기반의 멀티미디어 핑거프린팅 코드의 공모코드들에 대한 공모자 추적," 대한전자공학회, 전자공학회논문지-CI, 제46권 제6호, pp. 79-86, 2009.   과학기술학회마을
19 이강현, "신경망을 이용한 멀티미디어 핑거프린팅의 XOR-ACC 구현," 대한전자공학회, 전자공학회 논문지-CI, 제48권 제6호, pp. 1-8, 2011.   과학기술학회마을
20 Laarhoven T., Oosterwijk J. and Doumen, J. "Dynamic traitor tracing for arbitrary alphabets: Divide and conquer," Information Forensics and Security (WIFS), 2012 IEEE International Workshop on, pp. 240-245, 2012.
21 Jeffrey H. Dinitz and Douglas R. Stinson, "Contemporary Design Theory: A Collection of Surveys," Wiley, 1992.