Colluders Tracing on the Collusion Codes of Multimedia Fingerprinting Codes based on BIBD

BIBD 기반의 멀티미디어 핑거프린팅 코드의 공모코드들에 대한 공모자 추적

  • Rhee, Kang-Hyeon (Chosun University, Electronics & Information Engineering College, Dept. of Electronics Eng.)
  • 이강현 (조선대학교 전자정보공과대학 전자공학과)
  • Published : 2009.11.25

Abstract

In this paper, it has the performance metrics and the utility evaluation of the collusion codes about multimedia fingerprinting code based on BIBD and then the tracing algorithm of all colluders is proposed. Among the collusion codes, the bit stream of "all 0" or "all 1" are generated, also same collusion code and bit reversed code with user's fingerprinting code are generated. Thus there was occurred some problems, in which a colluder is deciding to anti-colluder or anti-colluder is deciding to colluder. In this paper, for the performance metrics and the utility evaluation of the collude codes, the experiment onto the total solution is processed by the logical collusion operation added with a partially processed averaging attack in the past papers. The proposed performance metrics and the utility evaluation about the collusion code generated from multimedia fingerprinting code based on BIBD is operated. Through the experiment, it confirmed that the ratio of colluder tracing is 100%.

본 논문에서는 BIBD 기반의 멀티미디어 핑거프린팅 코드에 대한 공모코드들의 성능측정과 효용성 평가를 하여, 공모자 전체를 추적할 수 알고리즘을 제안한다. 공모코드들 중에는 "all 0" 또는 "all 1"의 비트 열이 생성되고, 또한 사용자의 핑거프린팅 코드와 동일한 공모코드, 비트반전 된 공모코드가 생성이 되어 공모자가 비공모자로 판정이 되거나, 비공모자가 공모자로 판정이 되는 경우가 발생한다. 따라서 공모자의 추적에 어려움이 발생한다. 본 논문에서 공모코드들의 성능측정 및 효용성 평가를 하기 위하여, 기존의 논문에서 부분적으로 처리되었던 평균화공격에 total solution으로 논리적 공모연산을 추가하여 실험하였다. 제안된 본 논문의 BIBD 기반의 멀티미디어 핑거프린팅 코드에 대한 공모공격 코드 생성의 성능측정, 효용성 평가의 실험을 통하여 공모자 추적이 100% 이루어짐을 확인하였다.

Keywords

References

  1. K.H. Rhee, 'DRM Implementation by Multimedia Fingerprint,' IEEK Computer Society, Vol.46, No.3, pp.50-56, 2009. 5
  2. 이강현, '디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크,' 대한전자공학회 논문지 CI, 43권 8호, pp.101-109, 2006. 11
  3. D. Boneh and J. Shaw, 'Collusion-secure fingerprinting for digital data,' IEEE Tran. on Information Theory, vol. 44, pp. 1897-1905, September 1998 https://doi.org/10.1109/18.705568
  4. Trappe W., Min Wu, Ray Liu K.J., 'Collusion-resistant fingerprinting for multimedia,' IEEE International Conference on Acoustics, Speech, and Signal Processing 2002, Proceedings(ICASSP '02), vol.4, pp. IV-3309-IV-3312, 13-17 May 2002
  5. Lin W.S., Zhao H.V., Ray liu K.J., 'Scalable Multimedia Fingerprinting Forensics with Side Information,' IEEE International Conference on Image Processing, 2006, pp.2293-2296, 8-11 Oct. 2006
  6. 김원겸, 이선화, 서용석, '공모공격에 강인한 디지털 핑거프린팅 기술,' 정보과학회지, 23권 8호, pp.52-60, 2005.8
  7. ie Yang, Xiaoxia Xu, 'A Robust Anti-collusion Coding in Digital Fingerprinting System,' IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2006, pp.996-999, 4-7 Dec. 2006
  8. Shashanka D., Bora P.K, 'Collusion Secure Scalable Video Fingerprinting Scheme,' International Conference on Advanced Computing and Communications, ADCOM 2007, pp.641-647, 18-21 Dec. 2007 https://doi.org/10.1109/ADCOM.2007.120
  9. Jie Yang, Ping Liu, GuoZhen Tan, 'The digital fingerprint coding based on LDPC,' Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on Volume 3, pp. 2600-2603, 31 Aug.-4 Sept. 2004
  10. Jie Yang, Xiaoxia Xu, 'A Robust Anti-collusion Coding in Digital Fingerprinting System,' The 8th International Conference on Signal Processing, Volume 4, 2006.
  11. Zang Li, Trappe W, 'Collusion-resistant fingerprints from WBE sequence sets,' IEEE International Conference on Communications, ICC 2005, Volume 2, pp. 1336-1340, 16-20 May 2005 https://doi.org/10.1109/ICC.2005.1494563
  12. In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, 'Averaging attack resilient video fingerprinting,' IEEE International Symposium on Circuits and Systems, ISCAS 2005, Vol. 6, pp.5529-5532, 23-26 May 2005
  13. 노진수, 이강현 '신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출' 전자공학회논문지, 제43권 CI편 제4호, pp.80-87, 2006. 7
  14. K.H. Rhee, 'Detection of Colluded Multimedia fingerprint using LDPC and BIBD,' IEEK Computer Society, Vol.43, No.5, pp.68-75, Sept. 2006
  15. J. Kilian, T. Leighton, L. R. Matheson, T. G. Shammon, R. E. Tarjan and F. Jane, 'Resistance of Digital Watermarks to collusive Attacks,' Tech. Rep., TR-585-98, Dept. of Computer Science, Prinston University, 1998
  16. Wade Trappe, Min Wu, Jane Wang and K.J. Ray Liu 'Anti-collusion Fingerprinting for Multimedia,' IEEE Tran. on Signal Processing, VOL.51, NO.4, pp.1069-1087, April 2003 https://doi.org/10.1109/TSP.2003.809378
  17. J. Dittmann, 'Combining Digital watermarks and Collusion Secure Fingerprints for Customer Copy Monitoring,' Proc. IEE Seminar Sec. Image & Image Auth., pp.128-132, Mar. 2000 https://doi.org/10.1049/ic:20000217
  18. F. Sebe and Domingo-Ferrer, 'Short 3-Secure Fingerprinting Codes for Copyright Protection,' Lecture Notes in Computer Science, Vol. 2384, pp.316-327, 2002 https://doi.org/10.1007/3-540-45450-0_25
  19. http://mathworld.wolfram.com/BlockDesign.html
  20. Dinitz, J. H. and Stinson, D. R. 'A Brief Introduction to Design Theory,' Ch. 1 in Contemporary Design Theory: A Collection of Surveys (Ed. J. H. Dinitz and D. R. Stinson). New York: Wiley, pp.1-12, 1992
  21. Ryser, H. J. 'The (b,v,r,k,lambda)-Configuration.' $\S$8.1 in Combinatorial Mathematics. Buffalo, NY: Math. Assoc. Amer., pp.96-102, 1963