A Note on the Limits of Collusion-Resistant Watermarks

نویسندگان

  • Funda Ergün
  • Joe Kilian
  • Ravi Kumar
چکیده

In one proposed use of digital watermarks, the owner of a document D sells slightly different documents, D, D, . . . to each buyer; if a buyer posts his/her document D to the web, the owner can identify the source of the leak. More general attacks are however possible in which k buyers create some composite document D∗; the goal of the owner is to identify at least one of the conspirators. We show, for a reasonable model of digital watermarks, fundamental limits on their efficacy against collusive attacks. In particular, if the effective document length is n, then at most O( p n/ ln n) adversaries can defeat any watermarking scheme. Our attack is, in the theoretical model, oblivious to the watermarking scheme being used; in practice, it uses very little information about the watermarking scheme. Thus, using a proprietary system seems to give only a very weak defense.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Note on the Limits of Collusion - ResistantWatermarksFunda Ergun ?

In one proposed use of digital watermarks, the owner of a document D sells slightly diierent documents, D 1 ; D 2 ; : : : to each buyer; if a buyer posts his/her document D i to the web, the owner can identify the source of the leak. More general attacks are however possible in which k buyers create some composite document D ; the goal of the owner is to identify at least one of the conspirator...

متن کامل

Collusion-resilient fingerprinting using random prewarping

Fingerprinting of audio-visual content using digital watermarks is an effective means of determining the originators of unauthorized copies and fighting piracy in digital distribution networks. In particular, watermarks embedded within the content help trace the traitor responsible for the piracy. A group of users may, however, collude and collectively escape identification by creating an avera...

متن کامل

False Negative probabilities in Tardos codes

Forensic watermarking is the application of digital watermarks for the purpose of tracing unauthorized redistribution of content. One of the most powerful types of attack on watermarks is the collusion attack, in which multiple users compare their differently watermarked versions of the same content. Collusion-resistant codes have been developed against these attacks. One of the most famous suc...

متن کامل

Countermeasure for collusion attacks against digital watermarking

Customer identification watermarking today is one of the most promising application domains of digital watermarking. It enables to identify individual copies of otherwise indistinguishable digital copies. If done without any precautions, those individual watermarking are vulnerable to a number of specialized attacks based on an attacker collecting more than one individual copy. Fingerprinting a...

متن کامل

Inter-frame Collusion Attack in SS-N Video Watermarking System

Video watermarking is usually considered as watermarking of a set of still images. In frame-by-frame watermarking approach, each video frame is seen as a single watermarked image, so collusion attack is more critical in video watermarking. If the same or redundant watermark is used for embedding in every frame of video, the watermark can be estimated and then removed by watermark estimate remod...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999