Impacts of Watermarking Security on ...
Type de document :
Article dans une revue scientifique: Article original
Titre :
Impacts of Watermarking Security on Tardos-based Fingerprinting
Auteur(s) :
Mathon, Benjamin [Auteur correspondant]
GIPSA - Communication Information and Complex Systems [GIPSA-CICS]
Laboratoire de Télécommunications et Télédétection [Louvain] [TELE]
Bas, Patrick [Auteur]
LAGIS-SI
Cayre, François [Auteur]
GIPSA - Communication Information and Complex Systems [GIPSA-CICS]
Macq, Benoît [Auteur]

GIPSA - Communication Information and Complex Systems [GIPSA-CICS]
Laboratoire de Télécommunications et Télédétection [Louvain] [TELE]
Bas, Patrick [Auteur]

LAGIS-SI
Cayre, François [Auteur]
GIPSA - Communication Information and Complex Systems [GIPSA-CICS]
Macq, Benoît [Auteur]
Titre de la revue :
IEEE Transactions on Information Forensics and Security
Pagination :
1038 - 1050
Éditeur :
Institute of Electrical and Electronics Engineers
Date de publication :
2013-04-25
ISSN :
1556-6013
Mot(s)-clé(s) en anglais :
Watermarking
Spread-spectrum
Security
Active Fingerprinting
Spread-spectrum
Security
Active Fingerprinting
Discipline(s) HAL :
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
Informatique [cs]/Traitement du signal et de l'image [eess.SP]
Informatique [cs]/Traitement du signal et de l'image [eess.SP]
Résumé en anglais : [en]
This article presents a study of the embedding of Tardos binary fingerprinting codes with watermarking techniques. By taking into account the security of the embedding scheme, we present a new approach for colluding ...
Lire la suite >This article presents a study of the embedding of Tardos binary fingerprinting codes with watermarking techniques. By taking into account the security of the embedding scheme, we present a new approach for colluding strategies which relies on the possible estimation error rate of the code symbols (denoted epsilon). We derive a new attack strategy called "epsilon-Worst Case Attack" and show its efficiency using the computation of achievable rates for simple decoding. Then we consider the interplay between security and robustness regarding the accusation performances of the fingerprinting scheme and show that (1) for a same accusation rate secure schemes can afford to be less robust than insecure ones, and (2) that secure schemes enable to cast the Worst Case Attack into an interleaving attack. Additionally, we use the security analysis of the watermarking scheme to derive from epsilon a security attack for a fingerprinting scheme based on Tardos codes and a new scheme called stochastic spread-spectrum watermarking. We compare a removal attack against an AWGN robustness attack and we show that for the same distortion, the combination of a fingerprinting attack and a security attack easily outperform classical attacks even with a small number of observations.Lire moins >
Lire la suite >This article presents a study of the embedding of Tardos binary fingerprinting codes with watermarking techniques. By taking into account the security of the embedding scheme, we present a new approach for colluding strategies which relies on the possible estimation error rate of the code symbols (denoted epsilon). We derive a new attack strategy called "epsilon-Worst Case Attack" and show its efficiency using the computation of achievable rates for simple decoding. Then we consider the interplay between security and robustness regarding the accusation performances of the fingerprinting scheme and show that (1) for a same accusation rate secure schemes can afford to be less robust than insecure ones, and (2) that secure schemes enable to cast the Worst Case Attack into an interleaving attack. Additionally, we use the security analysis of the watermarking scheme to derive from epsilon a security attack for a fingerprinting scheme based on Tardos codes and a new scheme called stochastic spread-spectrum watermarking. We compare a removal attack against an AWGN robustness attack and we show that for the same distortion, the combination of a fingerprinting attack and a security attack easily outperform classical attacks even with a small number of observations.Lire moins >
Langue :
Anglais
Comité de lecture :
Oui
Audience :
Internationale
Vulgarisation :
Non
Collections :
Source :
Fichiers
- https://hal.archives-ouvertes.fr/hal-00813362/document
- Accès libre
- Accéder au document
- https://hal.archives-ouvertes.fr/hal-00813362/document
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- Mathon2013.pdf
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- Mathon2013.pdf
- Accès libre
- Accéder au document