By Topic

Impact of Social Network Structure on Multimedia Fingerprinting Misbehavior Detection and Identification

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Zhao, H.V. ; Dept. of Electr. & Comput. Eng., Univ. of Alberta, Edmonton, AB, Canada ; Liu, K.J.R.

Users in video-sharing social networks actively interact with each other, and it is of critical importance to model user behavior and analyze the impact of human factors on video sharing systems. In video-sharing social networks, users have access to extra resources from their peers, and they also contribute their own resources to help others. Each user wants to maximize his/her own payoff, and they negotiate with each other to achieve fairness and address this conflict. However, some selfish users may cheat to their peers and manipulate the system to maximize their own payoffs, and cheat prevention is a critical requirement in many social networks to stimulate user cooperation. It is of ample importance to design monitoring mechanisms to detect and identify misbehaving users, and to design cheat-proof cooperation stimulation strategies. Using video fingerprinting as an example, this paper analyzes the complex dynamics among colluders during multiuser collusion, and explores possible monitoring mechanisms to detect and identify misbehaving colluders in multiuser collusion. We consider two types of colluder networks: one has a centralized structure with a trusted ringleader, and the other is a distributed peer-structured network. We investigate the impact of network structures on misbehavior detection and identification, propose different selfish colluder identification schemes for different colluder networks, and analyze their performance. We show that the proposed schemes can accurately identify selfish colluders without falsely accusing others even under attacks. We also evaluate their robustness against framing attacks and quantify the maximum number of framing colluders that they can resist.

Published in:

Selected Topics in Signal Processing, IEEE Journal of  (Volume:4 ,  Issue: 4 )