A Note on the Limits of Collusion - ResistantWatermarksFunda Ergun ?

نویسندگان

  • Funda Ergun
  • Ravi Kumar
چکیده

In one proposed use of digital watermarks, the owner of a document D sells slightly diierent documents, D 1 ; D 2 ; : : : to each buyer; if a buyer posts his/her document D i to the web, the owner can identify the source of the leak. More general attacks are however possible in which k buyers create some composite document D ; the goal of the owner is to identify at least one of the conspirators. We show, for a reasonable model of digital watermarks, fundamental limits on their eecacy against collusive attacks. In particular, if the eeective document length is n, then at most O(p n= ln n) adversaries can defeat any watermarking scheme. Our attack is, in the theoretical model, oblivious to the watermarking scheme being used; in practice, it uses very little information about the watermarking scheme. Thus, using a proprietary system seems to give only a very weak defense.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Eliminate Collusion in Tenders and Auctions, using Game Theory (Determination of Ceiling and Floor Prices)

Governments and firms in accordance to their duties, obliged to inevitably contracts with Individuals and legal entities, especially in auction and tender process. Since, the law of conducting tenders and auctions is lacking efficiency and has major objection, therefore, this has led to the dissemination and development of areas of corruption in these contracts (through collusion). In this pape...

متن کامل

Using 2D Lerchs and Grossmann Algorithm to Design Final Pit Limits of Sungun Copper Deposit of Iran (TECHNICAL NOTE)

The Sungun copper deposit is located in about 40km north west of Ahar city in the east Azarbaigan province of Iran. The total geological ore deposit is estimated to be 740 million tons. In this study using all information from exploration and geotechnical studies of the area, final pit limits of Sungun copper deposit is designed by the 2-D Lerchs & Grossmann Algorithm. By this method, from 740 ...

متن کامل

Collusion Theory: Where to Go Next?

This note comments on Feuerstein’s (Feuerstein, Switgard, BCollusion in industrial economics: A survey,^ forthcoming in Journal of Industry, Competition and Trade, 2005) survey of collusion theory. I start by presenting evidence from a recent real-world collusion case: the lysine industry. Based on this, I point out a few areas where collusion theory can improve: (a) the problem of equilibrium ...

متن کامل

Effect of Heat Recirculation in Biomass Flame Stability within a Cylindrical Micro-Combustor (TECHNICAL NOTE)

Flame stability inside a cylindrical micro-combustor was studied. Considering occurrence of heat recirculation, the respective relations were written and with parameters such as motion speed of reactants, flame propagation speed and thermal conductivity of the combustor’s wall, flame stability and its location inside micro-combustor were studied. It was found that for each thermal conductivity ...

متن کامل

A collusion attack on the fuzzy vault scheme

The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006