{"title":"指纹系统时变合谋攻击分析:容量和吞吐量","authors":"Byung-Ho Cha, C.-C. Jay Kuo","doi":"10.1109/ISCAS.2009.5117793","DOIUrl":null,"url":null,"abstract":"We analyze time-varying collusion attacks for a fingerprinting system using concepts of capacity and throughput in this work. Continuous media provide a limited resource for data embedding, which is analogous to the capacity of a wireless communication channel. Here, we characterize the capacity of a host media using the just-noticeable-distortion (JND) of the human visual system (HVS). Furthermore, the collusion attack can be interpreted as a channel shared by multiple users. Based on this analogy, the colluder detection performance can be understood from the viewpoint of throughput. Specifically, we show how to determine instantaneous throughput using the fingerprint-to-interference-plus-noise ratio (FINR), and extend it to the total throughput and the averaged throughput over a time interval. Our analysis provides a good framework to the understanding of collusion attacks and ways to enhance the traitor tracing performance of a fingerprinting system.","PeriodicalId":388394,"journal":{"name":"2009 IEEE International Symposium on Circuits and Systems","volume":"88 3-4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Analysis of time-varying collusion attacks in fingerprinting systems: Capacity and throughput\",\"authors\":\"Byung-Ho Cha, C.-C. Jay Kuo\",\"doi\":\"10.1109/ISCAS.2009.5117793\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We analyze time-varying collusion attacks for a fingerprinting system using concepts of capacity and throughput in this work. Continuous media provide a limited resource for data embedding, which is analogous to the capacity of a wireless communication channel. Here, we characterize the capacity of a host media using the just-noticeable-distortion (JND) of the human visual system (HVS). Furthermore, the collusion attack can be interpreted as a channel shared by multiple users. Based on this analogy, the colluder detection performance can be understood from the viewpoint of throughput. Specifically, we show how to determine instantaneous throughput using the fingerprint-to-interference-plus-noise ratio (FINR), and extend it to the total throughput and the averaged throughput over a time interval. Our analysis provides a good framework to the understanding of collusion attacks and ways to enhance the traitor tracing performance of a fingerprinting system.\",\"PeriodicalId\":388394,\"journal\":{\"name\":\"2009 IEEE International Symposium on Circuits and Systems\",\"volume\":\"88 3-4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-05-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Symposium on Circuits and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCAS.2009.5117793\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Symposium on Circuits and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCAS.2009.5117793","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of time-varying collusion attacks in fingerprinting systems: Capacity and throughput
We analyze time-varying collusion attacks for a fingerprinting system using concepts of capacity and throughput in this work. Continuous media provide a limited resource for data embedding, which is analogous to the capacity of a wireless communication channel. Here, we characterize the capacity of a host media using the just-noticeable-distortion (JND) of the human visual system (HVS). Furthermore, the collusion attack can be interpreted as a channel shared by multiple users. Based on this analogy, the colluder detection performance can be understood from the viewpoint of throughput. Specifically, we show how to determine instantaneous throughput using the fingerprint-to-interference-plus-noise ratio (FINR), and extend it to the total throughput and the averaged throughput over a time interval. Our analysis provides a good framework to the understanding of collusion attacks and ways to enhance the traitor tracing performance of a fingerprinting system.