Title :
Collusion of fingerprints via the gradient attack
Author_Institution :
Microsoft Res., Redmond, WA
Abstract :
The difficulty of building an effective digital rights management system stems from the fact that traditional cryptographic primitives such as encryption or scrambling do not protect audio or video signals once they are played in plain-text. This fact, commonly referred to as "the analog hole," has been responsible for the popularity of multimedia file sharing which cannot be controlled, at least technically, by content\´s copyright owners. In this paper, we explore a specific issue in multimedia fingerprinting as an answer to "the analog hole" problem. We analyze the collusion resistance of spread-spectrum fingerprints with an arbitrary probability distribution of their source using a recently introduced collusion procedure, the gradient attack
Keywords :
cryptography; multimedia systems; statistical distributions; analog hole; arbitrary probability distribution; collusion resistance; cryptographic primitives; digital rights management system; encryption; gradient attack; multimedia file sharing; multimedia fingerprinting; scrambling; spread-spectrum fingerprints; Cryptography; Fingerprint recognition; Forensics; Peer to peer computing; Probability distribution; Protection; Robustness; Spread spectrum communication; Video sharing; Watermarking;
Conference_Titel :
Information Theory, 2005. ISIT 2005. Proceedings. International Symposium on
Conference_Location :
Adelaide, SA
Print_ISBN :
0-7803-9151-9
DOI :
10.1109/ISIT.2005.1523754