DocumentCode :
1437042
Title :
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Author :
Chen, Yan ; Lin, W. Sabrina ; Liu, K. J Ray
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA
Volume :
19
Issue :
7
fYear :
2010
fDate :
7/1/2010 12:00:00 AM
Firstpage :
1798
Lastpage :
1807
Abstract :
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. To develop an efficient collusion-resistant fingerprinting scheme, it is very important for the system designer to understand how the behavior dynamics of colluders affect the performance of collusion attack. In the literature, little effort has been made to explicitly study the relationship between risk, e.g., the probability of the colluders to be detected, and the distortion of the colluded signal. In this paper, we investigate the risk-distortion relationship for the linear video collusion attack with Gaussian fingerprint. We formulate the optimal linear collusion attack as an optimization problem of finding the optimal collusion parameters to minimize the distortion subject to a risk constraint. By varying the risk constraint and solving the corresponding optimization problem, we can derive the optimal risk-distortion curve. Moreover, based upon the observation that the detector/attacker can each improve the detection/attack performance with the knowledge of his/her opponent´s strategy, we formulate the attack and detection problem as a dynamic mouse and cat game and study the optimal strategies for both the attacker and detector. We show that if the detector uses a fixed detection strategy, the attacker can estimate the detector´s strategy and choose the corresponding optimal strategy to attack the fingerprinted video with a small distortion. However, if the detector is powerful, i.e., the detector can always estimate the attacker´s strategy, the best strategy for the attacker is the min-max strategy. Finally, we conduct several experiments to verify the proposed risk-distortion model using real video data.
Keywords :
Gaussian processes; authorisation; copy protection; fingerprint identification; game theory; minimax techniques; rate distortion theory; video coding; Gaussian fingerprint; collusion-resistant fingerprinting scheme; copyright protection; digital fingerprinting; fingerprinted video; fixed detection strategy; linear video collusion attack; min-max strategy; mouse-and-cat game; optimal collusion parameters; optimal linear collusion attack; optimal risk-distortion curve; public networks; risk constraint; risk-distortion analysis; risk-distortion relationship; unauthorized redistribution; video collusion attacks; video content protection; video sharing; Authorization; Constraint optimization; Detectors; Fingerprint recognition; Games; Performance analysis; Protection; Risk analysis; Video compression; Video sharing; Game theory; fingerprint; risk distortion; video collusion;
fLanguage :
English
Journal_Title :
Image Processing, IEEE Transactions on
Publisher :
ieee
ISSN :
1057-7149
Type :
jour
DOI :
10.1109/TIP.2010.2045030
Filename :
5428839
Link To Document :
بازگشت