2010 IEEE International Workshop on Information Forensics and Security 2010
DOI: 10.1109/wifs.2010.5711457
|View full text |Cite
|
Sign up to set email alerts
|

Security and robustness constraints for spread-spectrum Tardos fingerprinting

Abstract: This paper presents a practical analysis of the impact of robustness and security on Tardos' collusion-secure fingerprinting codes using spread-spectrum watermarking modulations. In this framework, we assume that the coalition has to face an embedding scheme of given security level and consequently has to suffer a probability of wrongly estimating their embedded symbols. We recall the Worst Case Attack associated to this probability, e.g. the optimal attack which minimises the mutual information between the se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…The last important contribution of the article is that watermark security attacks can outperform AWGN attacks even when the estimation error rate is big. This work is an extension of the work presented in [21], where the ǫ-WCA was introduced, and takes into account the interplay between fingerprinting constraints (accusation performance) and watermarking constraints (security and robustness).…”
Section: Introductionmentioning
confidence: 99%
“…The last important contribution of the article is that watermark security attacks can outperform AWGN attacks even when the estimation error rate is big. This work is an extension of the work presented in [21], where the ǫ-WCA was introduced, and takes into account the interplay between fingerprinting constraints (accusation performance) and watermarking constraints (security and robustness).…”
Section: Introductionmentioning
confidence: 99%