Impacts of Watermarking Security on Tardos-Based Fingerprinting

This paper presents a study of the embedding of Tardos binary fingerprinting codes with watermarking techniques. By taking into account the security of the embedding scheme, we present a new approach for colluding strategies which relies on the possible estimation error rate of the code symbols (den...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information forensics and security Vol. 8; no. 6; pp. 1038 - 1050
Main Authors Mathon, B., Bas, P., Cayre, F., Macq, B.
Format Journal Article
LanguageEnglish
Published New York, NY IEEE 01.06.2013
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper presents a study of the embedding of Tardos binary fingerprinting codes with watermarking techniques. By taking into account the security of the embedding scheme, we present a new approach for colluding strategies which relies on the possible estimation error rate of the code symbols (denoted ∈). We derive a new attack strategy called " ∈-Worst Case Attack" and show its efficiency using the computation of achievable rates for simple decoding. Then we consider the interplay between security and robustness regarding the accusation performances of the fingerprinting scheme and show that 1) for the same accusation rate secure schemes can afford to be less robust than insecure ones, and 2) that secure schemes enable to cast the Worst Case Attack into an interleaving attack. Additionally, we use the security analysis of the watermarking scheme to derive from ∈ a security attack for a fingerprinting scheme based on Tardos codes and a new scheme called stochastic spread-spectrum watermarking. We compare a removal attack against an AWGN robustness attack and we show that for the same distortion, the combination of a fingerprinting attack and a security attack easily outperform classical attacks even with a small number of observations.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:1556-6013
1556-6021
DOI:10.1109/TIFS.2013.2260158