2006 International Conference on Image Processing 2006
DOI: 10.1109/icip.2006.312832
|View full text |Cite
|
Sign up to set email alerts
|

Selfish Colluder Detection and Identification in Traitors within Traitors

Abstract: During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same risk of being detected. Although they might agree so, some selfish colluders may break away from their fair-collusion agreement and process their fingerprinted copies before collusion to further lower their risk. On the other hand, to protect their own interests, other attackers may wish to detect and prevent such selfish pre-collusion… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2007
2007
2009
2009

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…In addition, for each copy, only the corresponding colluder and the trusted ringleader can access the fingerprinted coefficients. Therefore, the selfish colluder detection and identification algorithm in [40] also protects the secrecy of all the fingerprinted copies and prevents framing attacks.…”
Section: Centralized Social Network With Trusted Ringleadersmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, for each copy, only the corresponding colluder and the trusted ringleader can access the fingerprinted coefficients. Therefore, the selfish colluder detection and identification algorithm in [40] also protects the secrecy of all the fingerprinted copies and prevents framing attacks.…”
Section: Centralized Social Network With Trusted Ringleadersmentioning
confidence: 99%
“…The selfish colluder identification algorithm proposed in [40] can accurately identify all selfish colluders without falsely accusing any others. In addition, for each copy, only the corresponding colluder and the trusted ringleader can access the fingerprinted coefficients.…”
Section: Centralized Social Network With Trusted Ringleadersmentioning
confidence: 99%
“…The work in [5] considered the scenario where there is a ringleader whom all colluders trust and investigated how the trust ringleader can help detect and identify selfish colluders. This paper focuses on autonomous selfish colluder identification, where there does not exist a trusted ringleader and colluders help each other detect selfish behavior.…”
Section: Problem Formulationmentioning
confidence: 99%
“…We introduce the problem of traitors within traitors and formulate the dynamics among colluders in Section 2. Section 3 reviews selfish colluder identification with a trusted ringleader [5]. Section 4 proposes an autonomous selfish colluder detection algorithm, and we show simulation results in Section 5.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation