My ICIP 2006 Schedule
Note: Your custom schedule will not be saved unless you create a new account or login to an existing account.
|Time:||Wednesday, October 11, 09:40 - 10:00
|| Security: Forensics|
|| BEHAVIOR FORENSICS IN TRAITORS WITHIN TRAITORS FOR SCALABLE MULTIMEDIA|
||K. J. Ray Liu; University of Maryland|| |
| ||H. Vicky Zhao; University of Maryland|| |
|| A cost effective attack against multimedia forensics is the multi-user collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying fingerprints and hinder traitor tracing. An important issue in collusion is to ensure that all colluders have the same probability of being detected. While they might agree so, some selfish colluders may wish to further lower their own risk of being caught. This paper investigates this problem of “traitors within traitors”, in an effort to formulate the dynamics among attackers during collusion. We consider scalable multimedia forensic systems where users receive fingerprinted copies of different quality due to network and device heterogeneity, and explore the techniques that a selfish colluder can use to minimize his/her probability of being detected. Our results show that changing the resolution of their received copies before multi-user collusion can help selfish colluders further reduce their risk, especially when the colluded copy has high resolution.|