Font Size: a A A

Research On Fingerprinting And Collusion Attack Technology

Posted on:2012-05-04Degree:MasterType:Thesis
Country:ChinaCandidate:J S ZhangFull Text:PDF
GTID:2248330395985525Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
When our lives are enriched by the rapid development of digital multimediatechnology and extensive use of the internet accelerates the pace of communicationamong people, copyright piracy becomes more and more serious. How to protect thepublisher’ interests is become an important topic before us. As a new copyrightprotection technology, digital fingerprinting is mainly solves the problem of thecollusion attack. The basic principles of the digital fingerprint technology areembedding the ID which is unique to user into the digital content. When there is acollusion version of the digital content, colluders can be identify from calculating thesimilarity of the fingerprinting which is extracted from the collusion version.The current study of the fingerprinting is focus on collusion attack, fingerprintingcoding and the detection of the fingerprinting. This paper is mainly concerning withthe collusion attack and fingerprinting coding. The main contents and achievements ofthis paper as following:According to guiding ideology of designing the collusion attack, two novelattacks which based the visual model and probability are proposed. The idea ofcollusion attack based visual model comes from the embedding method of thefingerprinting which using the perceptual masking. Its main purpose is erasefingerprinting through estimating the energy of the original digital content. T he resultshows the collusion is an effective attack. The thoughts of based probability collusionattack come from the coding of TARDOS fingerprinting. Scrambling the fingerprintingand reducing the relevant statistics of detection are its characteristics.A new scalable fingerprinting scheme whose construction based theory ofcombinatorial designs and cyclic symmetric balanced incomplete block design ispresented. In the case of non-extension, this fingerprinting scheme can identify allcolluders. Under extension case, two users collusion is security. The experiment resultreveals that this fingerprinting scheme is robust and has good anti-collusionperformance.
Keywords/Search Tags:Digital fingerprinting, Collusion attack, Visual model, Probabilisticattack, Scalable fingerprinting
PDF Full Text Request
Related items