Regular Simplex Fingerprints and Their Optimality Properties
This paper addresses the design of additive fingerprints that are maximally resilient against linear collusion attacks on a focused correlation detector, as defined below. Let N be the length of the host vector and M les N + 1 the number of users. The focused detector performs a correlation test in...
Saved in:
| Published in | IEEE transactions on information forensics and security Vol. 4; no. 3; pp. 318 - 329 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
IEEE
01.09.2009
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1556-6013 1556-6021 |
| DOI | 10.1109/TIFS.2009.2025855 |
Cover
| Abstract | This paper addresses the design of additive fingerprints that are maximally resilient against linear collusion attacks on a focused correlation detector, as defined below. Let N be the length of the host vector and M les N + 1 the number of users. The focused detector performs a correlation test in order to decide whether a user of interest is among the colluders. Both the fingerprint embedder and the colluders are subject to squared-error distortion constraints. We show that simplex fingerprints maximize a geometric figure of merit for this detector. In that sense they outperform orthogonal fingerprints but the advantage vanishes as M rarr infin. They are also optimal in terms of minimizing the probability of error of the focused detector when the attack is a uniform averaging of the marked copies followed by the addition of white Gaussian noise. Reliable detection is guaranteed provided that the number of colluders K Lt radic( N ). Moreover, we study the probability of error performance of simplex fingerprints for the focused correlation detector when the colluders use nonuniform averaging plus white Gaussian noise attacks. |
|---|---|
| AbstractList | Reliable detection is guaranteed provided that the number of colluders K Lt radic(N). [...] we study the probability of error performance of simplex fingerprints for the focused correlation detector when the colluders use nonuniform averaging plus white Gaussian noise attacks. This paper addresses the design of additive fingerprints that are maximally resilient against linear collusion attacks on a focused correlation detector, as defined below. Let N be the length of the host vector and M les N + 1 the number of users. The focused detector performs a correlation test in order to decide whether a user of interest is among the colluders. Both the fingerprint embedder and the colluders are subject to squared-error distortion constraints. We show that simplex fingerprints maximize a geometric figure of merit for this detector. In that sense they outperform orthogonal fingerprints but the advantage vanishes as M rarr infin. They are also optimal in terms of minimizing the probability of error of the focused detector when the attack is a uniform averaging of the marked copies followed by the addition of white Gaussian noise. Reliable detection is guaranteed provided that the number of colluders K Lt radic( N ). Moreover, we study the probability of error performance of simplex fingerprints for the focused correlation detector when the colluders use nonuniform averaging plus white Gaussian noise attacks. |
| Author | Kalker, T. Kiyavash, N. Moulin, P. |
| Author_xml | – sequence: 1 givenname: N. surname: Kiyavash fullname: Kiyavash, N. organization: Dept. of Ind. & Enterprise Syst. Eng., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA – sequence: 2 givenname: P. surname: Moulin fullname: Moulin, P. – sequence: 3 givenname: T. surname: Kalker fullname: Kalker, T. |
| BookMark | eNp9kMFKAzEQhoNUsFUfQLwsXjy1ZpLNNgEvUqwWChVbzyHZna0p2901SUHf3i0tPXjwMjMw3z8M34D06qZGQm6AjgCoeljNpssRo1R1hQkpxBnpgxDZMKMMeqcZ-AUZhLChNE0hk33y-I7rXWV8snTbtsLvZOrqNfrWuzqGxNRFsvpE55NFG93WVC7-JG--adFHh-GKnJemCnh97JfkY_q8mrwO54uX2eRpPsw5S-OwVGAslDIFkRY0H-dWKbSZKXOkPKXcFlZZyizv9qgE5KUVKRSUMSxtoSS_JPeHu61vvnYYot66kGNVmRqbXdAyUzIVALwj7_6Qm2bn6-45LUUmVaaY6qDxAcp9E4LHUucumuiaOnrjKg1U753qvVO9d6qPTrsk_El2orbG__ybuT1kHCKeeAGCMyn4L_fHhAc |
| CODEN | ITIFA6 |
| CitedBy_id | crossref_primary_10_1155_2011_502782 crossref_primary_10_1109_TIT_2012_2229781 crossref_primary_10_1371_journal_pone_0065985 crossref_primary_10_1109_TIFS_2010_2078505 crossref_primary_10_1016_j_compeleceng_2019_01_017 crossref_primary_10_3390_s22218400 crossref_primary_10_1109_TIFS_2009_2026462 crossref_primary_10_1109_TIFS_2014_2305799 crossref_primary_10_1109_TIFS_2017_2779112 crossref_primary_10_1109_TIFS_2009_2034188 |
| Cites_doi | 10.1109/83.650120 10.1109/TIP.2005.847284 10.1109/49.29611 10.1109/ICIP.1996.560429 10.1109/ISIT.1998.708876 10.1109/TIFS.2009.2026462 10.1109/ICASSP.2009.4959861 10.1109/ISIT.2007.4557308 10.1109/CISS.2006.286642 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
| DOI | 10.1109/TIFS.2009.2025855 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitleList | Civil Engineering Abstracts Civil Engineering Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1556-6021 |
| EndPage | 329 |
| ExternalDocumentID | 2291735521 10_1109_TIFS_2009_2025855 5153285 |
| Genre | orig-research |
| GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D RIG F28 |
| ID | FETCH-LOGICAL-c324t-f91ab1f84154d0c7cb99eb6afce03403bdb9b02b3154e951cfb541d022efbd983 |
| IEDL.DBID | RIE |
| ISSN | 1556-6013 |
| IngestDate | Sat Sep 27 21:54:03 EDT 2025 Mon Jun 30 03:35:30 EDT 2025 Wed Oct 01 03:15:35 EDT 2025 Thu Apr 24 23:01:22 EDT 2025 Tue Aug 26 16:47:31 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c324t-f91ab1f84154d0c7cb99eb6afce03403bdb9b02b3154e951cfb541d022efbd983 |
| Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 content type line 23 |
| PQID | 856896929 |
| PQPubID | 85506 |
| PageCount | 12 |
| ParticipantIDs | crossref_citationtrail_10_1109_TIFS_2009_2025855 proquest_miscellaneous_869845113 crossref_primary_10_1109_TIFS_2009_2025855 ieee_primary_5153285 proquest_journals_856896929 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2009-09-01 |
| PublicationDateYYYYMMDD | 2009-09-01 |
| PublicationDate_xml | – month: 09 year: 2009 text: 2009-09-01 day: 01 |
| PublicationDecade | 2000 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on information forensics and security |
| PublicationTitleAbbrev | TIFS |
| PublicationYear | 2009 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref15 moulin (ref6) 2002 hocking (ref12) 1988 ref14 boneh (ref1) 1995; 963 ref10 wozencraft (ref13) 1967 ref2 ref16 ref8 ref7 ref4 ref3 munkres (ref11) 1993 blahut (ref9) 0 ergun (ref5) 1999 |
| References_xml | – ident: ref3 doi: 10.1109/83.650120 – ident: ref7 doi: 10.1109/TIP.2005.847284 – ident: ref10 doi: 10.1109/49.29611 – year: 2002 ident: ref6 article-title: the gaussian fingerprinting game publication-title: Proc Conf Information Sciences and Systems (CISS) – year: 0 ident: ref9 publication-title: An Introduction to Telecommunications – start-page: 140 year: 1999 ident: ref5 article-title: a note on the bounds of collusion resistant watermarks publication-title: Eurocrypt 99 – ident: ref2 doi: 10.1109/ICIP.1996.560429 – year: 1993 ident: ref11 publication-title: Elements of Algebraic Topology – ident: ref4 doi: 10.1109/ISIT.1998.708876 – ident: ref15 doi: 10.1109/TIFS.2009.2026462 – volume: 963 start-page: 452 year: 1995 ident: ref1 publication-title: Proc CRYPTO '95 – year: 1967 ident: ref13 publication-title: Principles of Communications Engineering – ident: ref8 doi: 10.1109/ICASSP.2009.4959861 – ident: ref16 doi: 10.1109/ISIT.2007.4557308 – year: 1988 ident: ref12 publication-title: Topology – ident: ref14 doi: 10.1109/CISS.2006.286642 |
| SSID | ssj0044168 |
| Score | 1.9389731 |
| Snippet | This paper addresses the design of additive fingerprints that are maximally resilient against linear collusion attacks on a focused correlation detector, as... Reliable detection is guaranteed provided that the number of colluders K Lt radic(N). [...] we study the probability of error performance of simplex... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 318 |
| SubjectTerms | Additives Collusion attacks Copyright protection Correlation Data security Detectors Error detection Fingerprint recognition fingerprinting Fingerprints Gaussian Gaussian noise Noise Nonuniform Optimization Performance evaluation Reproduction Signal detection simplex codes Testing Vectors |
| Title | Regular Simplex Fingerprints and Their Optimality Properties |
| URI | https://ieeexplore.ieee.org/document/5153285 https://www.proquest.com/docview/856896929 https://www.proquest.com/docview/869845113 |
| Volume | 4 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1556-6021 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0044168 issn: 1556-6013 databaseCode: RIE dateStart: 20060101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fSxwxEB7Up_rQ07Olp1by4FPpnru3u7kEfBHpocK1xZ7g25Ifs1DUPdE9EP96Z7K7R60ivi0kWUImyXwzk_kGYF-VBKqtZCPHuCjzJAudShOhH9lEudJjoGOY_pQnF9nZZX65At-XuTCIGB6f4ZA_Qyzfz92CXWUHpHvTkcpXYXWsZJOr1d26pNWbtLc8lxEZGWkbwUxifTA7nfxpmCnJ0id4nD_TQaGoyoubOKiXSQ-m3cSaVyVXw0Vth-7xP87G9858Az62OFMcNRtjE1aw6kOvq-Eg2iPdh_V_CAm34PA8lKan9r_MGvwgJsHrx86_-l6YyosZBxbEL7pobgKCF7_Zm3_HtKyf4GLyY3Z8ErX1FSJHMKqOSp0Ym5SKdHjmYzd2Vmu00pRcQyyLU-uttvHIptSOhMRcafMs8aT1sbReq_QzrFXzCr-AwNxjxqmHnixGJ71BMo1SOxobNNnY6QHE3YoXriUf5xoY10UwQmJdsJC4JqYuWiEN4NtyyG3DvPFW5y1e9GXHdr0HsNOJtWjP5n2hcqm0JFg4ALFspUPFkRJT4XxBXaRWTNyWbr_-3x340ESV-K3ZLqzVdwv8SuCktnthVz4BKNfg2g |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6V9gAcKLQglvLwgRMi22Rje2OpF4RYbUu3rWAr9Rb5MZFQSxa1WQnx6zvjJKsWUNVbJNuR5bE938x4vgF4X1QEqp1mI8f6RAaShcm1TTCMXFb4KmCkY5gd6empPDhTZ2vwcZULg4jx8RkO-TPG8sPCL9lVtku6Nx8V6gFsKCmlarO1-nuX9Hqb-KaUTsjMyLsYZpaa3fn-5HvLTUm2PgFkdUsLxbIq_9zFUcFMNmHWT619V3I-XDZu6P_8xdp437k_hScd0hSf2q3xDNaw3oLNvoqD6A71Fjy-QUm4DXvfYnF6av_BvMG_xST6_dj911wJWwcx59CCOKar5mfE8OKE_fmXTMz6HE4nX-afp0lXYSHxBKSapDKZdVlVkBaXIfVj74xBp23FVcRkmrvgjEtHLqd2JCzmK6dkFkjvY-WCKfIXsF4vanwJAlVAycmHgWxGr4NFMo5yNxpbtHLszQDSfsVL39GPcxWMizKaIakpWUhcFdOUnZAG8GE15FfLvXFX521e9FXHbr0HsNOLtexO51VZKF0YTcBwAGLVSseKYyW2xsWSumhTMHVb_ur__30HD6fz2WF5uH_0dQcetTEmfnn2GtabyyW-IajSuLdxh14DFYzkJw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Regular+Simplex+Fingerprints+and+Their+Optimality+Properties&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Kiyavash%2C+N.&rft.au=Moulin%2C+P.&rft.au=Kalker%2C+T.&rft.date=2009-09-01&rft.pub=IEEE&rft.issn=1556-6013&rft.volume=4&rft.issue=3&rft.spage=318&rft.epage=329&rft_id=info:doi/10.1109%2FTIFS.2009.2025855&rft.externalDocID=5153285 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |