Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme
In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to 1/ c of its original value when c copies are averaged by colluders. In this study, we analyze the model of the averaging attack by considering quantization that causes nonlinear changes i...
Saved in:
| Published in | IEEE transactions on information forensics and security Vol. 5; no. 4; pp. 670 - 680 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
New York
IEEE
01.12.2010
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1556-6013 1556-6021 |
| DOI | 10.1109/TIFS.2010.2082535 |
Cover
| Abstract | In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to 1/ c of its original value when c copies are averaged by colluders. In this study, we analyze the model of the averaging attack by considering quantization that causes nonlinear changes in the fingerprint sequence. Our detailed analysis reveals that the attenuation of the signal energy strongly depends on the quantization performed during the embedding and averaging stages. We estimate the actual attenuation factor from the perspective of a stochastic model in the spatial domain and derive an attenuation factor that differs considerably from the conventional one. Our simulation result indicates that the actual attenuation factor is classified into the best and worst cases from the detector's perspective. Furthermore, we demonstrate that colluders can select the worst case by comparing their fingerprinted copies. A countermeasure for preventing the worst-case scenario is also proposed in this paper. |
|---|---|
| AbstractList | In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to 1 / c of its original value when c copies are averaged by colluders. In this study, we analyze the model of the averaging attack by considering quantization that causes nonlinear changes in the fingerprint sequence. Our detailed analysis reveals that the attenuation of the signal energy strongly depends on the quantization performed during the embedding and averaging stages. We estimate the actual attenuation factor from the perspective of a stochastic model in the spatial domain and derive an attenuation factor that differs considerably from the conventional one. Our simulation result indicates that the actual attenuation factor is classified into the best and worst cases from the detector's perspective. Furthermore, we demonstrate that colluders can select the worst case by comparing their fingerprinted copies. A countermeasure for preventing the worst-case scenario is also proposed in this paper. In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to [Formula Omitted] of its original value when [Formula Omitted] copies are averaged by colluders. In this study, we analyze the model of the averaging attack by considering quantization that causes nonlinear changes in the fingerprint sequence. Our detailed analysis reveals that the attenuation of the signal energy strongly depends on the quantization performed during the embedding and averaging stages. We estimate the actual attenuation factor from the perspective of a stochastic model in the spatial domain and derive an attenuation factor that differs considerably from the conventional one. Our simulation result indicates that the actual attenuation factor is classified into the best and worst cases from the detector's perspective. Furthermore, we demonstrate that colluders can select the worst case by comparing their fingerprinted copies. A countermeasure for preventing the worst-case scenario is also proposed in this paper. |
| Author | Kato, H Kuribayashi, M |
| Author_xml | – sequence: 1 givenname: M surname: Kuribayashi fullname: Kuribayashi, M email: kminoru@kobe-u.ac.jp organization: Grad. Sch. of Eng., Kobe Univ., Kobe, Japan – sequence: 2 givenname: H surname: Kato fullname: Kato, H organization: Grad. Sch. of Eng., Kobe Univ., Kobe, Japan |
| BookMark | eNp9kE1Lw0AQhhdRsK3-APES8OApdWe_khxLabVQEGw9h81moinNbt0kB_-9G1p66MHTzDDPOwzPmFxbZ5GQB6BTAJq9bFfLzZTRMDKaMsnlFRmBlCpWlMH1uQd-S8Ztu6NUCFDpiMxWzUGbLnJV9OF6W9b2K1p473zkbLQ5eNRlKGg63zfRMmzRH3xtu4HbmG9s8I7cVHrf4v2pTsjncrGdv8Xr99fVfLaOjeCyi1OeailoKisAkCVTyhgBRaIKiSVwKZRKqcREl5xyLKoiEciE4mWmIatExSfk-Xj34N1Pj22XN3VrcL_XFl3f5qnIRCKYkoF8uiB3rvc2PJcD5RSkkooFKjlSxru29Vjlpu50VzvbeV3vA5oPZvPBbD6YzU9mQxIukkFJo_3vv5nHY6ZGxDMvZcYZKP4HL2qEAg |
| CODEN | ITIFA6 |
| CitedBy_id | crossref_primary_10_1007_s11042_014_1948_8 crossref_primary_10_1016_j_asoc_2013_04_008 crossref_primary_10_1155_2014_432740 crossref_primary_10_1109_TIFS_2011_2170421 |
| Cites_doi | 10.1109/TIFS.2006.873597 10.1016/S0165-1684(00)00205-X 10.1109/TIP.2005.847284 10.1109/TIFS.2009.2025860 10.1007/978-3-540-75651-4_3 10.1109/TIT.1968.1054106 10.1109/TIP.2005.846035 10.1109/ISIT.1998.708876 10.1109/TIFS.2006.885023 10.1109/83.650120 10.1109/MSP.2004.1276103 10.1117/1.2790911 10.1109/TIFS.2006.879279 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Dec 2010 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Dec 2010 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
| DOI | 10.1109/TIFS.2010.2082535 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitleList | Civil Engineering Abstracts Civil Engineering Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1556-6021 |
| EndPage | 680 |
| ExternalDocumentID | 2724184341 10_1109_TIFS_2010_2082535 5593216 |
| Genre | orig-research |
| GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D RIG F28 |
| ID | FETCH-LOGICAL-c435t-838a54085f1115d266cc41b76b5ed135466805e7ad303ebfb74e2463d9a19f4f3 |
| IEDL.DBID | RIE |
| ISSN | 1556-6013 |
| IngestDate | Tue Sep 30 23:53:23 EDT 2025 Mon Jun 30 04:19:59 EDT 2025 Wed Oct 01 03:15:35 EDT 2025 Thu Apr 24 23:07:41 EDT 2025 Tue Aug 26 16:39:48 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c435t-838a54085f1115d266cc41b76b5ed135466805e7ad303ebfb74e2463d9a19f4f3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
| OpenAccessLink | https://hdl.handle.net/20.500.14094/90001356 |
| PQID | 1030156562 |
| PQPubID | 85506 |
| PageCount | 11 |
| ParticipantIDs | proquest_miscellaneous_849474265 proquest_journals_1030156562 crossref_citationtrail_10_1109_TIFS_2010_2082535 ieee_primary_5593216 crossref_primary_10_1109_TIFS_2010_2082535 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2010-12-01 |
| PublicationDateYYYYMMDD | 2010-12-01 |
| PublicationDate_xml | – month: 12 year: 2010 text: 2010-12-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on information forensics and security |
| PublicationTitleAbbrev | TIFS |
| PublicationYear | 2010 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ergun (ref14) 1999; 1592 ref15 stone (ref3) 1996; 96 45 wang (ref9) 2004; 14 ref11 ref10 ref2 ref1 ref17 ref16 zhu (ref8) 2005; 3710 ref7 ref4 ref6 ref5 |
| References_xml | – ident: ref10 doi: 10.1109/TIFS.2006.873597 – ident: ref17 doi: 10.1016/S0165-1684(00)00205-X – volume: 96 45 year: 1996 ident: ref3 publication-title: Analysis of attacks on image watermarks with randomized coefficients – ident: ref7 doi: 10.1109/TIP.2005.847284 – ident: ref6 doi: 10.1109/TIFS.2009.2025860 – ident: ref11 doi: 10.1007/978-3-540-75651-4_3 – ident: ref13 doi: 10.1109/TIT.1968.1054106 – volume: 14 start-page: 2142 year: 2004 ident: ref9 article-title: group-oriented fingerprinting for multimedia forensics publication-title: EURASIP J Appl Signal Process – ident: ref5 doi: 10.1109/TIP.2005.846035 – ident: ref4 doi: 10.1109/ISIT.1998.708876 – ident: ref16 doi: 10.1109/TIFS.2006.885023 – ident: ref2 doi: 10.1109/83.650120 – ident: ref1 doi: 10.1109/MSP.2004.1276103 – volume: 3710 start-page: 67 year: 2005 ident: ref8 article-title: collusion secure convolutional spread spectrum fingerprinting publication-title: Proc IWDW 2005 – volume: 1592 start-page: 140 year: 1999 ident: ref14 article-title: A note on the limits of collusion-resistant watermarks publication-title: Advances in Cryptology?EUROCRYPT 99 – ident: ref12 doi: 10.1117/1.2790911 – ident: ref15 doi: 10.1109/TIFS.2006.879279 |
| SSID | ssj0044168 |
| Score | 1.9539704 |
| Snippet | In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to 1/ c of its original value when c copies are... In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to [Formula Omitted] of its original value when... In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to 1 / c of its original value when c copies are... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 670 |
| SubjectTerms | Attenuation Collusion attack Correlation Fingerprint recognition Fingerprinting Fingerprints Frequency domain analysis Mathematical models Military technology Quantization quantization error Spread spectrum Spreads Stochastic models Studies Watermarking |
| Title | Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme |
| URI | https://ieeexplore.ieee.org/document/5593216 https://www.proquest.com/docview/1030156562 https://www.proquest.com/docview/849474265 |
| Volume | 5 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1556-6021 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0044168 issn: 1556-6013 databaseCode: RIE dateStart: 20060101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB5WT3pwfeLqKjl4Ertum0ebo8gurqAHH-CtNO0UQW2XfVz89U7Sh6Ii3kqbhDKTzHxJZuYDOBGhjoyRmWdSLjwRoPISzIXnap9kCVfK1e68uVVXj-L6ST514KzNhUFEF3yGA_vo7vKzMl3ao7JzQr888NUKrISRqnK1GqtLXr1Ke5NSebTJ4PUNpj_U5w-T8X0VxBXYDZFjdvv0QY5U5Ycldu5l3IWb5seqqJKXwXJhBun7t5qN__3zTdiocSa7qCbGFnSw2IZuw-HA6iW9DetfChLuwMXEJU2yMmd3lm-JXrLRbFbOWFmw-ykBzIxZxvrFbPnGxu5E0B4M2tBpGvIZ33AXHsejh8srryZZ8FJCSgsv4lEibZmznKyezMhfp6nwTaiMxMznUigVDSWGSUbODk1uQoGBUDzTia9zkfM9WC3KAveBqVRTZ4U6kigSHxPBA009kXAGWVHRg2Ej9jitK5BbIozX2O1Ehjq2moqtpuJaUz04bbtMq_IbfzXesZJvG9ZC70G_0W1cL9B5bNnVfAtmgx6w9jMtLXtfkhRYLudxJLQICcHIg98HPoS1oA1u6cMqyR6PCKIszLGbmx8h0OCH |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB2VcoAeKLQgFtriAydEtpt47MTHCnW1C90e6FbqzYqTiSpBk2q7e-mvZ-x8gKBCvUWObVkee-bZnpkH8BFTkzmnysgVEiNMSEc5VRiF3CdlLrUOuTsX53p2iV-v1NUWfB5iYYgoOJ_R2H-Gt_yyKTb-quyY0a9MYv0EnipEVG20Vq932a63gW9K6YiPGbJ7w4wn5ng5n160blyJPxIFbrffVijQqvyji4OBme7Coh9a61fyY7xZu3Fx_1fWxseO_SW86JCmOGmXxivYonoPdnsWB9Ft6j3Y-SMl4T6czEPYpGgq8d0zLnGhOF2tmpVoanFxyxCzFJ6zfr3a3IhpuBP0V4PeeZq7vKYbeg2X09Pll1nU0SxEBWOldZTJLFc-0VnFek-VbLGLAmOXaqeojKVCrbOJojQv2dyRq1yKlKCWpcljU2El38B23dT0FoQuDDfWZDJFmMeUo0wMtyRGGqxHcQSTftpt0eUg91QYP204i0yM9ZKyXlK2k9QIPg1NbtsEHP-rvO9nfqjYTfoIDnrZ2m6L3lnPrxZ7OJuMQAy_eXP5F5O8pmZzZzM0mDKGUe8e7vgDPJstF2f2bH7-7T08TwZXlwPYZjnQIQOWtTsK6_QXDK_j1A |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Impact+of+Rounding+Error+on+Spread+Spectrum+Fingerprinting+Scheme&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Kuribayashi%2C+Minoru&rft.au=Kato%2C+Hiroshi&rft.date=2010-12-01&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=5&rft.issue=4&rft.spage=670&rft.epage=680&rft_id=info:doi/10.1109%2FTIFS.2010.2082535&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIFS_2010_2082535 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |