TY - JOUR T1 - Collusion-resistant fingerprinting for multimedia JF - Signal Processing Magazine, IEEE Y1 - 2004 A1 - M. Wu A1 - Trappe,W. A1 - Wang,Z.J. A1 - Liu,K. J.R KW - attacks; KW - colluder KW - collusion KW - collusion-resistant KW - content; KW - correlated KW - data; KW - digital KW - fingerprinting; KW - identification; KW - multimedia KW - multiuser KW - of KW - orthogonal KW - policies; KW - rights KW - Security KW - systems; KW - techniques; KW - tracing; KW - watermarking KW - watermarking; AB - Digital fingerprinting is a technology for enforcing digital rights policies whereby unique labels, known as digital fingerprints, are inserted into content prior to distribution. For multimedia content, fingerprints can be embedded using conventional watermarking techniques that are typically concerned with robustness against a variety of attacks mounted by an individual. These attacks, known as multiuser collusion attacks, provide a cost-effective method for attenuating each of the colluder's fingerprints and poses a real threat to protecting media data and enforcing usage policies. In this article, we review some major design methodologies for collusion-resistant fingerprinting of multimedia and highlight common and unique issues of different fingerprinting techniques. It also provides detailed discussions on the two major classes of fingerprinting strategies, namely, orthogonal fingerprinting and correlated fingerprinting. VL - 21 SN - 1053-5888 CP - 2 M3 - 10.1109/MSP.2004.1276103 ER - TY - CONF T1 - Attacks on digital watermarks T2 - Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on Y1 - 1999 A1 - M. Wu A1 - Liu,Bede KW - attacks;copy KW - Authentication KW - authentication;video KW - based KW - block KW - coding; KW - coding;iterative KW - control;digital KW - countermeasure;fragile-watermarking;images;iterative KW - dropping;ownership KW - EMBEDDING KW - forging;copyright;image KW - methods;message KW - protection;robust KW - removal;videos;watermarks KW - size;concealment KW - system;robust KW - systems;block KW - watermark KW - watermarking KW - watermarks KW - watermarks;double AB - Two methods for attacking watermarks in images and videos have been proposed. The first attack is to remove robust watermarks by iterative block dropping and concealment. Our study suggests that the block size chosen by a robust watermark embedding system should be large enough to circumventing concealment based attacks. The second attacking method is to forge valid watermarks for authentication systems based on fragile-watermarking. Double watermarking is then proposed as one possible countermeasure. JA - Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on VL - 2 M3 - 10.1109/ACSSC.1999.832001 ER -