DocumentCode :
1572435
Title :
Selfish Colluder Detection and Identification in Traitors within Traitors
Author :
Zhao, H. Vicky ; Liu, K.J.R.
Author_Institution :
Dept. of Electr. & Comput. Eng., Maryland Univ., College Park, MD, USA
fYear :
2006
Firstpage :
2289
Lastpage :
2292
Abstract :
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same risk of being detected. Although they might agree so, some selfish colluders may break away from their fair-collusion agreement and process their fingerprinted copies before collusion to further lower their risk. On the other hand, to protect their own interests, other attackers may wish to detect and prevent such selfish pre-collusion processing. It is important to study this problem of traitors within traitors, formulate the dynamics among colluders and build a complete model of multi-user collusion. This paper investigates techniques that attackers can use to detect and identify selfish colluders without revealing the secrecy of any fingerprinted copies. Our simulation results show that the proposed scheme accurately identifies all selfish colluders without falsely accusing any others.
Keywords :
fingerprint identification; multimedia systems; security of data; fingerprinted copies; multimedia forensics; multiuser collusion attacks; selfish colluder detection; traitors identification; Educational institutions; Fingerprint recognition; Forensics; Multimedia systems; Performance analysis; Protection; Security; Signal processing algorithms; Spread spectrum communication; Video signal processing; multimedia systems; security; video signal processing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Image Processing, 2006 IEEE International Conference on
Conference_Location :
Atlanta, GA
ISSN :
1522-4880
Print_ISBN :
1-4244-0480-0
Type :
conf
DOI :
10.1109/ICIP.2006.312832
Filename :
4107023
Link To Document :
بازگشت