Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme

In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to 1/ c of its original value when c copies are averaged by colluders. In this study, we analyze the model of the averaging attack by considering quantization that causes nonlinear changes i...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information forensics and security Vol. 5; no. 4; pp. 670 - 680
Main Authors Kuribayashi, M, Kato, H
Format Journal Article
LanguageEnglish
Published New York IEEE 01.12.2010
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1556-6013
1556-6021
DOI10.1109/TIFS.2010.2082535

Cover

Abstract In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to 1/ c of its original value when c copies are averaged by colluders. In this study, we analyze the model of the averaging attack by considering quantization that causes nonlinear changes in the fingerprint sequence. Our detailed analysis reveals that the attenuation of the signal energy strongly depends on the quantization performed during the embedding and averaging stages. We estimate the actual attenuation factor from the perspective of a stochastic model in the spatial domain and derive an attenuation factor that differs considerably from the conventional one. Our simulation result indicates that the actual attenuation factor is classified into the best and worst cases from the detector's perspective. Furthermore, we demonstrate that colluders can select the worst case by comparing their fingerprinted copies. A countermeasure for preventing the worst-case scenario is also proposed in this paper.
AbstractList In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to 1 / c of its original value when c copies are averaged by colluders. In this study, we analyze the model of the averaging attack by considering quantization that causes nonlinear changes in the fingerprint sequence. Our detailed analysis reveals that the attenuation of the signal energy strongly depends on the quantization performed during the embedding and averaging stages. We estimate the actual attenuation factor from the perspective of a stochastic model in the spatial domain and derive an attenuation factor that differs considerably from the conventional one. Our simulation result indicates that the actual attenuation factor is classified into the best and worst cases from the detector's perspective. Furthermore, we demonstrate that colluders can select the worst case by comparing their fingerprinted copies. A countermeasure for preventing the worst-case scenario is also proposed in this paper.
In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to [Formula Omitted] of its original value when [Formula Omitted] copies are averaged by colluders. In this study, we analyze the model of the averaging attack by considering quantization that causes nonlinear changes in the fingerprint sequence. Our detailed analysis reveals that the attenuation of the signal energy strongly depends on the quantization performed during the embedding and averaging stages. We estimate the actual attenuation factor from the perspective of a stochastic model in the spatial domain and derive an attenuation factor that differs considerably from the conventional one. Our simulation result indicates that the actual attenuation factor is classified into the best and worst cases from the detector's perspective. Furthermore, we demonstrate that colluders can select the worst case by comparing their fingerprinted copies. A countermeasure for preventing the worst-case scenario is also proposed in this paper.
Author Kato, H
Kuribayashi, M
Author_xml – sequence: 1
  givenname: M
  surname: Kuribayashi
  fullname: Kuribayashi, M
  email: kminoru@kobe-u.ac.jp
  organization: Grad. Sch. of Eng., Kobe Univ., Kobe, Japan
– sequence: 2
  givenname: H
  surname: Kato
  fullname: Kato, H
  organization: Grad. Sch. of Eng., Kobe Univ., Kobe, Japan
BookMark eNp9kE1Lw0AQhhdRsK3-APES8OApdWe_khxLabVQEGw9h81moinNbt0kB_-9G1p66MHTzDDPOwzPmFxbZ5GQB6BTAJq9bFfLzZTRMDKaMsnlFRmBlCpWlMH1uQd-S8Ztu6NUCFDpiMxWzUGbLnJV9OF6W9b2K1p473zkbLQ5eNRlKGg63zfRMmzRH3xtu4HbmG9s8I7cVHrf4v2pTsjncrGdv8Xr99fVfLaOjeCyi1OeailoKisAkCVTyhgBRaIKiSVwKZRKqcREl5xyLKoiEciE4mWmIatExSfk-Xj34N1Pj22XN3VrcL_XFl3f5qnIRCKYkoF8uiB3rvc2PJcD5RSkkooFKjlSxru29Vjlpu50VzvbeV3vA5oPZvPBbD6YzU9mQxIukkFJo_3vv5nHY6ZGxDMvZcYZKP4HL2qEAg
CODEN ITIFA6
CitedBy_id crossref_primary_10_1007_s11042_014_1948_8
crossref_primary_10_1016_j_asoc_2013_04_008
crossref_primary_10_1155_2014_432740
crossref_primary_10_1109_TIFS_2011_2170421
Cites_doi 10.1109/TIFS.2006.873597
10.1016/S0165-1684(00)00205-X
10.1109/TIP.2005.847284
10.1109/TIFS.2009.2025860
10.1007/978-3-540-75651-4_3
10.1109/TIT.1968.1054106
10.1109/TIP.2005.846035
10.1109/ISIT.1998.708876
10.1109/TIFS.2006.885023
10.1109/83.650120
10.1109/MSP.2004.1276103
10.1117/1.2790911
10.1109/TIFS.2006.879279
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Dec 2010
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Dec 2010
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
DOI 10.1109/TIFS.2010.2082535
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Civil Engineering Abstracts

Civil Engineering Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1556-6021
EndPage 680
ExternalDocumentID 2724184341
10_1109_TIFS_2010_2082535
5593216
Genre orig-research
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
RIG
F28
ID FETCH-LOGICAL-c435t-838a54085f1115d266cc41b76b5ed135466805e7ad303ebfb74e2463d9a19f4f3
IEDL.DBID RIE
ISSN 1556-6013
IngestDate Tue Sep 30 23:53:23 EDT 2025
Mon Jun 30 04:19:59 EDT 2025
Wed Oct 01 03:15:35 EDT 2025
Thu Apr 24 23:07:41 EDT 2025
Tue Aug 26 16:39:48 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c435t-838a54085f1115d266cc41b76b5ed135466805e7ad303ebfb74e2463d9a19f4f3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
OpenAccessLink https://hdl.handle.net/20.500.14094/90001356
PQID 1030156562
PQPubID 85506
PageCount 11
ParticipantIDs proquest_miscellaneous_849474265
proquest_journals_1030156562
crossref_citationtrail_10_1109_TIFS_2010_2082535
ieee_primary_5593216
crossref_primary_10_1109_TIFS_2010_2082535
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2010-12-01
PublicationDateYYYYMMDD 2010-12-01
PublicationDate_xml – month: 12
  year: 2010
  text: 2010-12-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2010
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ergun (ref14) 1999; 1592
ref15
stone (ref3) 1996; 96 45
wang (ref9) 2004; 14
ref11
ref10
ref2
ref1
ref17
ref16
zhu (ref8) 2005; 3710
ref7
ref4
ref6
ref5
References_xml – ident: ref10
  doi: 10.1109/TIFS.2006.873597
– ident: ref17
  doi: 10.1016/S0165-1684(00)00205-X
– volume: 96 45
  year: 1996
  ident: ref3
  publication-title: Analysis of attacks on image watermarks with randomized coefficients
– ident: ref7
  doi: 10.1109/TIP.2005.847284
– ident: ref6
  doi: 10.1109/TIFS.2009.2025860
– ident: ref11
  doi: 10.1007/978-3-540-75651-4_3
– ident: ref13
  doi: 10.1109/TIT.1968.1054106
– volume: 14
  start-page: 2142
  year: 2004
  ident: ref9
  article-title: group-oriented fingerprinting for multimedia forensics
  publication-title: EURASIP J Appl Signal Process
– ident: ref5
  doi: 10.1109/TIP.2005.846035
– ident: ref4
  doi: 10.1109/ISIT.1998.708876
– ident: ref16
  doi: 10.1109/TIFS.2006.885023
– ident: ref2
  doi: 10.1109/83.650120
– ident: ref1
  doi: 10.1109/MSP.2004.1276103
– volume: 3710
  start-page: 67
  year: 2005
  ident: ref8
  article-title: collusion secure convolutional spread spectrum fingerprinting
  publication-title: Proc IWDW 2005
– volume: 1592
  start-page: 140
  year: 1999
  ident: ref14
  article-title: A note on the limits of collusion-resistant watermarks
  publication-title: Advances in Cryptology?EUROCRYPT 99
– ident: ref12
  doi: 10.1117/1.2790911
– ident: ref15
  doi: 10.1109/TIFS.2006.879279
SSID ssj0044168
Score 1.9539704
Snippet In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to 1/ c of its original value when c copies are...
In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to [Formula Omitted] of its original value when...
In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to 1 / c of its original value when c copies are...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 670
SubjectTerms Attenuation
Collusion attack
Correlation
Fingerprint recognition
Fingerprinting
Fingerprints
Frequency domain analysis
Mathematical models
Military technology
Quantization
quantization error
Spread spectrum
Spreads
Stochastic models
Studies
Watermarking
Title Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme
URI https://ieeexplore.ieee.org/document/5593216
https://www.proquest.com/docview/1030156562
https://www.proquest.com/docview/849474265
Volume 5
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1556-6021
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0044168
  issn: 1556-6013
  databaseCode: RIE
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB5WT3pwfeLqKjl4Ertum0ebo8gurqAHH-CtNO0UQW2XfVz89U7Sh6Ii3kqbhDKTzHxJZuYDOBGhjoyRmWdSLjwRoPISzIXnap9kCVfK1e68uVVXj-L6ST514KzNhUFEF3yGA_vo7vKzMl3ao7JzQr888NUKrISRqnK1GqtLXr1Ke5NSebTJ4PUNpj_U5w-T8X0VxBXYDZFjdvv0QY5U5Ycldu5l3IWb5seqqJKXwXJhBun7t5qN__3zTdiocSa7qCbGFnSw2IZuw-HA6iW9DetfChLuwMXEJU2yMmd3lm-JXrLRbFbOWFmw-ykBzIxZxvrFbPnGxu5E0B4M2tBpGvIZ33AXHsejh8srryZZ8FJCSgsv4lEibZmznKyezMhfp6nwTaiMxMznUigVDSWGSUbODk1uQoGBUDzTia9zkfM9WC3KAveBqVRTZ4U6kigSHxPBA009kXAGWVHRg2Ej9jitK5BbIozX2O1Ehjq2moqtpuJaUz04bbtMq_IbfzXesZJvG9ZC70G_0W1cL9B5bNnVfAtmgx6w9jMtLXtfkhRYLudxJLQICcHIg98HPoS1oA1u6cMqyR6PCKIszLGbmx8h0OCH
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB2VcoAeKLQgFtriAydEtpt47MTHCnW1C90e6FbqzYqTiSpBk2q7e-mvZ-x8gKBCvUWObVkee-bZnpkH8BFTkzmnysgVEiNMSEc5VRiF3CdlLrUOuTsX53p2iV-v1NUWfB5iYYgoOJ_R2H-Gt_yyKTb-quyY0a9MYv0EnipEVG20Vq932a63gW9K6YiPGbJ7w4wn5ng5n160blyJPxIFbrffVijQqvyji4OBme7Coh9a61fyY7xZu3Fx_1fWxseO_SW86JCmOGmXxivYonoPdnsWB9Ft6j3Y-SMl4T6czEPYpGgq8d0zLnGhOF2tmpVoanFxyxCzFJ6zfr3a3IhpuBP0V4PeeZq7vKYbeg2X09Pll1nU0SxEBWOldZTJLFc-0VnFek-VbLGLAmOXaqeojKVCrbOJojQv2dyRq1yKlKCWpcljU2El38B23dT0FoQuDDfWZDJFmMeUo0wMtyRGGqxHcQSTftpt0eUg91QYP204i0yM9ZKyXlK2k9QIPg1NbtsEHP-rvO9nfqjYTfoIDnrZ2m6L3lnPrxZ7OJuMQAy_eXP5F5O8pmZzZzM0mDKGUe8e7vgDPJstF2f2bH7-7T08TwZXlwPYZjnQIQOWtTsK6_QXDK_j1A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Impact+of+Rounding+Error+on+Spread+Spectrum+Fingerprinting+Scheme&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Kuribayashi%2C+Minoru&rft.au=Kato%2C+Hiroshi&rft.date=2010-12-01&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=5&rft.issue=4&rft.spage=670&rft.epage=680&rft_id=info:doi/10.1109%2FTIFS.2010.2082535&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIFS_2010_2082535
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon