By Topic

Risk minimization in traitors within traitors in multimedia forensics

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
H. V. Zhao ; Dept. of Electr. & Comput. Eng., Maryland Univ., College Park, MD, USA ; K. J. R. Liu

In digital fingerprinting and multimedia forensic systems, it is possible that multiple adversaries mount attacks collectively and effectively to undermine the forensic system's traitor tracing capability. During this collusion attack, an important issue that the adversaries need to address is the fairness of attack and ensuring that all colluders share the same risk of being caught. This paper studies the dynamics among attackers in enforcing the fairness of collusion and investigates the problem of traitors within traitors, in which some selfish colluders wish to minimize their own risk while still profiting from collusion. We explore the strategies that these selfish colluders can use to further lower their probability of being detected and analyze their performance. We show that by processing their fingerprinted copies before multi-user collusion, the selfish colluders can further reduce their risk at the cost of quality degradation of their fingerprinted copies.

Published in:

IEEE International Conference on Image Processing 2005  (Volume:3 )

Date of Conference:

11-14 Sept. 2005