350 rub
Journal Nonlinear World №12 for 2009 г.
Article in number:
A Performance Evaluation of Anticollusion Codes for Tracing of Illegal Redistributors of Digital Images
Authors:
V. I. Korzhik, A. S. Ushmotkin, A. V. Razumov, G. A. Bespalov
Abstract:
Today copyright relations in computer networks are very important matter. Due to some technical features it6 is not simple to prove somebody-s rights on digital images in court. Besides, traitors use many ways to made it impossible. The main scheme observed in this paper is collusion attack, when violators collude in group to redistribute illegal copy. this work providel the method which helps to detect colluders through analysis of illegal copy of digital imge. The main idea is in using special digital watermark called fingerprints, which is embedded in digital images by its owner or legal distributor. In this article authors propose to use random superimposed codes (SIC), introduces by Ericson and Gyorfi, as sequences for collusion-resistant fingerprints. This approach seems to be more suitable in comparison with the use of some regular sequences (like WBE-sequences) against watermark removal attacks. there is represented the evaluation of the probability of erroneous colluder detection for randomly shosen SIC in its work. Then authors observe the sphere decoding algorithm (SDA) which is used for tracing traitors. There is represented SDA decision tree. Authors note 2 ways for embedding fingerpreints: in order of stegokey and in blocks of pixels in order of pseudo random sequence. Either of the advantage of the second method is "blind" decoder usage capability. The performance evaluation of the proposed methods is presented in the work. Simulation results show a good efficiency of the proposed codes. The conclusion of work underlines the improvement of collusion resistance using SIC sequences and SDA method.
Pages: 903-911
References
  1. Ушмоткин А. С., Коржик В. И.Оценка эффективности использования системы цифровых «водяных» знаков для изображений в условиях коалиционных атак // Научно-технические ведомости СПбГПУ. Информатика. Телекоммуникации. Управление. 2008. № 5(68). С. 198-203.
  2. Ray, Liu, K. J., Multimedia Fingerprinting Forensics for Traitor Tracing // Hindawi Publishing Corporation. 2005.
  3. Zang, Li, Wade Trappe, Collusion-resistant Fingerprint from WBE Sequence Sets // In Proc. IEEE International Conference on Communications (ICC-05). P. 1336-1340.
  4. Ericson, T., Gyofri, L., Superimposed Codes in RN // IEEE Transaction on IT. 1988. V. 34. No. 4. P. 877-879.
  5. Gallager, R. G., Information Theory and Reliable Communication. John Wiley and Sons. 1968.
  6. Fincke, U., Pohst, M., Improved Methods for Calculating Vectors of Short Length in Lattice, Including a Complexity Analysis // Mathematics of Computation. 1985. V. 44. No. 150. P. 463-471.
  7. Ipatov, V., Spread Spectrum and CDMA. Principles and Applications, Wiley and Sons. 2005.
  8. Коржик В. И., Просихин В. П. Основы криптографии: Учеб. пособие. СПб.: Линк. 2008.