{"title":"Analysis of time-varying collusion attacks in fingerprinting systems: Capacity and throughput","authors":"Byung-Ho Cha, C.-C. Jay Kuo","doi":"10.1109/ISCAS.2009.5117793","DOIUrl":null,"url":null,"abstract":"We analyze time-varying collusion attacks for a fingerprinting system using concepts of capacity and throughput in this work. Continuous media provide a limited resource for data embedding, which is analogous to the capacity of a wireless communication channel. Here, we characterize the capacity of a host media using the just-noticeable-distortion (JND) of the human visual system (HVS). Furthermore, the collusion attack can be interpreted as a channel shared by multiple users. Based on this analogy, the colluder detection performance can be understood from the viewpoint of throughput. Specifically, we show how to determine instantaneous throughput using the fingerprint-to-interference-plus-noise ratio (FINR), and extend it to the total throughput and the averaged throughput over a time interval. Our analysis provides a good framework to the understanding of collusion attacks and ways to enhance the traitor tracing performance of a fingerprinting system.","PeriodicalId":388394,"journal":{"name":"2009 IEEE International Symposium on Circuits and Systems","volume":"88 3-4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Symposium on Circuits and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCAS.2009.5117793","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
We analyze time-varying collusion attacks for a fingerprinting system using concepts of capacity and throughput in this work. Continuous media provide a limited resource for data embedding, which is analogous to the capacity of a wireless communication channel. Here, we characterize the capacity of a host media using the just-noticeable-distortion (JND) of the human visual system (HVS). Furthermore, the collusion attack can be interpreted as a channel shared by multiple users. Based on this analogy, the colluder detection performance can be understood from the viewpoint of throughput. Specifically, we show how to determine instantaneous throughput using the fingerprint-to-interference-plus-noise ratio (FINR), and extend it to the total throughput and the averaged throughput over a time interval. Our analysis provides a good framework to the understanding of collusion attacks and ways to enhance the traitor tracing performance of a fingerprinting system.