646 ieee transactions on image processing, vol. 14, no....

16
646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 5, MAY 2005 Forensic Analysis of Nonlinear Collusion Attacks for Multimedia Fingerprinting H. Vicky Zhao, Member, IEEE, Min Wu, Member, IEEE, Z. Jane Wang, Member, IEEE, and K. J. Ray Liu, Fellow, IEEE Abstract—Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Unique identification information is embedded into each distributed copy of multimedia signal and serves as a digital fingerprint. Collusion attack is a cost-effective attack against digital fingerprinting, where colluders combine several copies with the same content but different fingerprints to remove or attenuate the original fingerprints. In this paper, we investigate the average collusion attack and several basic nonlinear collusions on independent Gaussian fingerprints, and study their effectiveness and the impact on the perceptual quality. With unbounded Gaussian fingerprints, perceivable distortion may exist in the fingerprinted copies as well as the copies after the collusion attacks. In order to remove this perceptual distor- tion, we introduce bounded Gaussian-like fingerprints and study their performance under collusion attacks. We also study several commonly used detection statistics and analyze their performance under collusion attacks. We further propose a preprocessing technique of the extracted fingerprints specifically for collusion scenarios to improve the detection performance. Index Terms—Digital forensics, multimedia fingerprinting, nonlinear collusion attacks, spread spectrum embedding, traitor tracing. I. INTRODUCTION W ITH the rapid development of multimedia technologies and the wide deployment of broadband networks, an in- creasing amount of multimedia data are distributed through net- works. This introduces an urgent need to protect the proper dis- tribution and use of multimedia content, especially in view of the ease of copying and manipulating digital multimedia data. Although traditional cryptography can provide multimedia data with desired security during transmission, the protection vanishes after the data are decrypted into clear text. Digital watermarking is one of the emerging technologies to address the protection of multimedia content after decryption [1]–[3], and digital fingerprinting is a specific application of digital wa- termarking to trace illegal redistribution of multimedia content, Manuscript received November 26, 2002; revised May 12, 2004. This work was supported in part by the Air Force Research Laboratory under DDET Grant F30602-03-2-0045 and in part by the National Science Foundation under CAREER Award CCR-0133704. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Gopal Pingali. H. V. Zhao, M. Wu, and K. J. R. Liu are with the Department of Electrical and Computer Engineering, Institute for Systems Research, University of Maryland, College Park, MD 20742 USA (e-mail: [email protected]; [email protected]; [email protected]). Z. J. Wang is with the Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, BC V6T 1Z4 Canada (e-mail: [email protected]). Digital Object Identifier 10.1109/TIP.2005.846035 where unique identification information is embedded into each copy prior to distribution. Collusion is a cost-effective attack against digital fingerprinting, where several users (colluders) combine information from different copies and generate a new copy in which the original fingerprints are removed or atten- uated [4], [5]. Digital fingerprints should not only be robust against common signal processing and single-copy attacks [6]–[8], but also be resistant to collusion attacks. An early work on digital fingerprint code design and collusion attacks was proposed in [9], which assumed that the colluders can detect a specific fingerprint code bit if it takes different values between their fingerprinted copies and can change it to any value. For those bits where different copies have the same value, it was assumed that the colluders cannot change an unde- tected bit without rendering the object useless. Based on these assumptions, a fingerprint code of length was built to catch at least one colluder out of up to total colluders with arbitrarily high probabilities, where is the number of total users. Similar work was presented in [10], which focused on tracing the leakage of decryption keys in broadcast instead of tracing multimedia content. In [11], improvement was made upon the fingerprint code in [9] by replacing the lower layer code with direct spread spectrum sequence. It relaxed the assumptions in [9] and in- creased the total number of users that can be supported by three times. In [12] and [13], new features were introduced in the fingerprint code, such as dynamic code design and asymmetric fingerprinting. These prior works mainly concern fingerprint code design and address few issues on the actual fingerprint embedding and detection. Multimedia data have a unique characteristic that minor perturbations on the values will not introduce per- ceptually distinguishable difference. This robustness makes it feasible and desirable to embed fingerprints seamlessly into the host multimedia data. Fingerprint codes designed by these prior works are usually too long to be reliably embedded into and extracted from multimedia data. Furthermore, for generic data, colluders can easily detect a fingerprint code bit if it differs between different copies and change it to any value. However, for multimedia data such as images, the embedding is capable of spreading each fingerprint code bit over the entire content. Thus, different bits embedded additively over the same region are not distinguishable, neither can they be changed to any value due to the perceptual quality constraint. Consequently, the assumptions of the collusion attacks in many previous works are not always suitable for multimedia data. Instead, the average attack and those order statistics based nonlinear 1057-7149/$20.00 © 2005 IEEE

Upload: others

Post on 29-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 5, MAY 2005

Forensic Analysis of Nonlinear Collusion Attacksfor Multimedia Fingerprinting

H. Vicky Zhao, Member, IEEE, Min Wu, Member, IEEE, Z. Jane Wang, Member, IEEE, and K. J. Ray Liu, Fellow, IEEE

Abstract—Digital fingerprinting is a technology for tracing thedistribution of multimedia content and protecting them fromunauthorized redistribution. Unique identification information isembedded into each distributed copy of multimedia signal andserves as a digital fingerprint. Collusion attack is a cost-effectiveattack against digital fingerprinting, where colluders combineseveral copies with the same content but different fingerprintsto remove or attenuate the original fingerprints. In this paper,we investigate the average collusion attack and several basicnonlinear collusions on independent Gaussian fingerprints, andstudy their effectiveness and the impact on the perceptual quality.With unbounded Gaussian fingerprints, perceivable distortionmay exist in the fingerprinted copies as well as the copies afterthe collusion attacks. In order to remove this perceptual distor-tion, we introduce bounded Gaussian-like fingerprints and studytheir performance under collusion attacks. We also study severalcommonly used detection statistics and analyze their performanceunder collusion attacks. We further propose a preprocessingtechnique of the extracted fingerprints specifically for collusionscenarios to improve the detection performance.

Index Terms—Digital forensics, multimedia fingerprinting,nonlinear collusion attacks, spread spectrum embedding, traitortracing.

I. INTRODUCTION

WITH the rapid development of multimedia technologiesand the wide deployment of broadband networks, an in-

creasing amount of multimedia data are distributed through net-works. This introduces an urgent need to protect the proper dis-tribution and use of multimedia content, especially in view ofthe ease of copying and manipulating digital multimedia data.

Although traditional cryptography can provide multimediadata with desired security during transmission, the protectionvanishes after the data are decrypted into clear text. Digitalwatermarking is one of the emerging technologies to addressthe protection of multimedia content after decryption [1]–[3],and digital fingerprinting is a specific application of digital wa-termarking to trace illegal redistribution of multimedia content,

Manuscript received November 26, 2002; revised May 12, 2004. This workwas supported in part by the Air Force Research Laboratory under DDETGrant F30602-03-2-0045 and in part by the National Science Foundation underCAREER Award CCR-0133704. The associate editor coordinating the reviewof this manuscript and approving it for publication was Dr. Gopal Pingali.

H. V. Zhao, M. Wu, and K. J. R. Liu are with the Department of Electricaland Computer Engineering, Institute for Systems Research, University ofMaryland, College Park, MD 20742 USA (e-mail: [email protected];[email protected]; [email protected]).

Z. J. Wang is with the Department of Electrical and Computer Engineering,University of British Columbia, Vancouver, BC V6T 1Z4 Canada (e-mail:[email protected]).

Digital Object Identifier 10.1109/TIP.2005.846035

where unique identification information is embedded into eachcopy prior to distribution. Collusion is a cost-effective attackagainst digital fingerprinting, where several users (colluders)combine information from different copies and generate a newcopy in which the original fingerprints are removed or atten-uated [4], [5]. Digital fingerprints should not only be robustagainst common signal processing and single-copy attacks[6]–[8], but also be resistant to collusion attacks.

An early work on digital fingerprint code design and collusionattacks was proposed in [9], which assumed that the colluderscan detect a specific fingerprint code bit if it takes differentvalues between their fingerprinted copies and can change it toany value. For those bits where different copies have the samevalue, it was assumed that the colluders cannot change an unde-tected bit without rendering the object useless. Based on theseassumptions, a fingerprint code of length wasbuilt to catch at least one colluder out of up to total colluderswith arbitrarily high probabilities, where is the number oftotal users. Similar work was presented in [10], which focusedon tracing the leakage of decryption keys in broadcast insteadof tracing multimedia content.

In [11], improvement was made upon the fingerprint codein [9] by replacing the lower layer code with direct spreadspectrum sequence. It relaxed the assumptions in [9] and in-creased the total number of users that can be supported by threetimes. In [12] and [13], new features were introduced in thefingerprint code, such as dynamic code design and asymmetricfingerprinting.

These prior works mainly concern fingerprint code designand address few issues on the actual fingerprint embeddingand detection. Multimedia data have a unique characteristicthat minor perturbations on the values will not introduce per-ceptually distinguishable difference. This robustness makes itfeasible and desirable to embed fingerprints seamlessly into thehost multimedia data. Fingerprint codes designed by these priorworks are usually too long to be reliably embedded into andextracted from multimedia data. Furthermore, for generic data,colluders can easily detect a fingerprint code bit if it differsbetween different copies and change it to any value. However,for multimedia data such as images, the embedding is capableof spreading each fingerprint code bit over the entire content.Thus, different bits embedded additively over the same regionare not distinguishable, neither can they be changed to anyvalue due to the perceptual quality constraint. Consequently,the assumptions of the collusion attacks in many previousworks are not always suitable for multimedia data. Instead,the average attack and those order statistics based nonlinear

1057-7149/$20.00 © 2005 IEEE

Page 2: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

ZHAO et al.: FORENSIC ANALYSIS OF NONLINEAR COLLUSION ATTACKS 647

collusions in [4] are more common when colluding multimediadata.

In [14], a two-layer fingerprinting design scheme for mul-timedia data was proposed where the inner code from thespread spectrum embedding [15] is combined with an outererror-correcting code. In [16], the finite projective geometrywas used to generate codes whose overlap with each other canidentify colluding users. The Anti Collusion Code based oncombinatorial theories was proposed in [5] for multimedia fin-gerprint code design. In [17], the collusion attack was modeledas averaging different copies followed by an additive noise, and

colluders were shown to be enough to breakthe fingerprint system where is the fingerprint code length.Similar results were given in [18]. The collusion attack modelwas generalized to linear shift invariant filtering followed byan additive noise in [19].

Most works on digital fingerprinting and collusion attacks formultimedia employ the watermark embedding method in [15]and use a linear collusion attack model. In [4], several typesof collusion attacks were studied, including a few nonlinearcollusion attacks. For uniformly distributed fingerprints, non-linear collusion attacks were shown to defeat the fingerprintingsystem more effectively than the average attack [4]. Simulationresults in [4] also showed that normally distributed fingerprintsare more robust against nonlinear collusion attacks than uniformfingerprints, but analytical study on the Gaussian fingerprints’performance was not provided. In addition to the robustnessagainst collusion attacks, compared with discrete watermarksand uniform watermarks, Gaussian watermarks have the advan-tage that they do not provide the attackers with the positionsand the amplitudes of the embedded watermarks under statis-tical and histogram attacks [20]. Therefore, we use in this paperGaussian distributed fingerprints. We first consider from the col-luders’ point of view and compare various nonlinear collusionattacks on independent Gaussian fingerprints. We analyze theeffectiveness of the collusion attacks and the perceptual qualityof the colluded signals. We then shift our role to desinger/de-tector and analyze the performance of several commonly useddetection statistics [4], [21], [22] in the literature under collu-sion attacks. There is no other work to our knowledge that com-pares their detection performance under collusion attacks. Weuse digital image as an example, and our results are applicableto other types of multimedia.

Note that, in addition to collusion attacks, the colluders canalso apply single-copy attacks to further hinder the detection.Spread spectrum embedding [15], [23] has been widely used inthe literature and is proven to be resistant to many single-copyattacks. Recent investigation has shown that simple rotation,scale and translation based geometric attacks may prevent thedetection of the embedded watermarks [24]. However, since thehost signal can be made available to the detector in digital finger-printing applications, the detector can first register the attackedcopy with respect to the host signal and undo the geometric at-tacks before the colluder identification process. It was shown in[25] that the alignment noise from inverting geometric distor-tions is generally very small and, therefore, will not significantly

affect the detection performance. Consequently, in this paper,we focus on collusion attacks, which are effective and have notbeen well studied in the literature. Real systems should containother components, e.g., the registration module, to combat pos-sible distortions of other types.

The organization of this paper is as follows. We begin, inSection II, with a system model of digital fingerprinting andcollusion attacks. Then, in Section III, we analyze the effective-ness and the perceptual quality of different nonlinear collusionattacks, and investigate the detection performance of differentdetection statistics. In Section IV, we first study the resistance ofindependent unbounded Gaussian fingerprints to different collu-sion attacks. We find that while Gaussian fingerprints are morerobust against collusion attacks, they may introduce noticeabledistortion in the fingerprinted copies due to their unbounded na-ture. In order to achieve both the robustness against collusion at-tacks and the imperceptibility, we introduce bounded Gaussian-like fingerprints and analyze their performance. In Section V,we propose a preprocessing technique of the extracted finger-prints to improve the detection performance. Section VI showsthe simulation results on real images. A few more nonlinear col-lusion attacks are discussed in Section VII. Finally, conclusionsare drawn in Section VIII.

II. SYSTEM MODEL

A. System Model and Assumptions

We consider a digital fingerprinting and collusion attacksystem that consists of three parts: fingerprint embedding,collusion attacks, and fingerprint detection.

We use in this paper the spread spectrum embedding [15],[23] to hide fingerprints in the host signal. Assume that there area total of users in the system. Given a host signal representedby a vector of length , the owner generates a unique finger-print of length for each user , . Inthis paper, we assume that the fingerprints areindependent of each other. The fingerprinted copy that isdistributed to user is generated by .

Here, , , and are the th components of the fin-gerprinted copy, the original signal, and the fingerprint, respec-tively, and is the just-noticeable-difference (JND) from humanvisual models [23] to control the energy and achieve the imper-ceptibility of the embedded fingerprints. Then, the fingerprintedcopy is distributed to user .

Assume that out of users collude, andis the set containing the indices of the

colluders. We further assume that the collusion attack is in thesame domain as the fingerprint embedding. With differentcopies , the colluders generate the th componentof the attacked copy using one of the collusion functionsshown in (1)

average attack

minimum attack

maximum attack

Page 3: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

648 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 5, MAY 2005

median attack

minmax attack

modified negative attack

randomized negative attackwith prob.with prob. .

(1)

In (1), , andreturn the minimum, the maximum and

the median values of , respectively. The colludedcopy is . For our model, applying thecollusion attacks to the fingerprinted copies is equivalent toapplying the collusion attacks to the embedded fingerprints.For example

In fingerprinting applications, the original signal is oftenavailable to detectors. To improve the detection performance[5], the detector first removes the host signal from the attackedcopy and extracts the fingerprint where

is a collusion function defined in (1). The detector analyzesthe similarity between and each of the original fingerprints

, and outputs the estimated colluder set.In the literature, there are three detection statistics available to

test the presence of the original fingerprint in the extractedfingerprint [4], [21], [22]

where

and

where

and (2)

In (2), is the Euclidean norm of ; is thelength of the fingerprint; is the estimated correlationcoefficient between and ; and

are the sample means of and

, respectively;

and are the unbiased esti-mates of the original fingerprint’s variance and the extractedfingerprint’s variance, respectively; and and are the

sample mean and sample variance of . Note that allthree detection statistics are correlation based in which thecorrelation between the extracted fingerprint and the original

fingerprint is the kernel term, and they differ primarily inthe way of normalization.

B. Performance Criteria

In this paper, we consider the following performance criteriato analyze different collusion attacks and different detectionstatistics.

1) Effectiveness of Collusion Attacks and Detection Perfor-mance of Detection Statistics: To study the effectiveness ofcollusion attacks and the performance of detection statistics,different criteria were used to address different applications inthe literature. One set of criteria is the probability of falselyaccusing at least one innocent user and the probability of notidentifying any of the colluders [17], [18]. The second set of cri-teria is the fraction of colluders that are successfully capturedand the fraction of innocent users that are falsely accused, asconsidered in [5] and [26]. In this paper, we adopt these criteriaand use the following measurements:

• : probability of capturing at least one colluder;• : probability of falsely accusing at least one innocent

user;• : fraction of colluders that are successfully captured;• : fraction of innocent users that are falsely accused.Different applications have different goals and may need dif-

ferent balance between capturing colluders and accusing inno-cent users. and are used in applications where falsely ac-cusing an innocent user may lead to severe consequences. Onepossible application is to provide digital evidence in the courtof law. The detector in these applications is designed to captureone colluder with high confidence. On the other hand, and

are used in applications where the detection process is com-bined with other components in the decision making system andother evidences to make the final decision. The detector there isdesigned to capture more colluders at the cost of accusing moreinnocent users.

2) Perceptual Quality: When considering the perceptualquality, one of the commonly used objective measurementson perceptual distortion is the mean square error (MSE) andequivalently PSNR for image applications. A major weak-ness of MSE is that it ignores the unique characteristic ofmultimedia data: minor perturbations on the data values willnot cause noticeable distortion as long as they do not exceedthe just-noticeable difference [23]. Furthermore, MSE onlymeasures the average energy of the noise introduced and doesnot consider the local constraints on each noise component.

We take JND into consideration and define the following twonew measurements:

• ;• the redefined mean square error

where is defined as

ififif .

(3)

calculates the power of the noise components that in-troduce perceptual distortion and reflects the percentageof the noise components that exceed JND. A large ora large indicates large perceptual distortion introduced.

Page 4: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

ZHAO et al.: FORENSIC ANALYSIS OF NONLINEAR COLLUSION ATTACKS 649

III. STATISTICAL ANALYSIS OF COLLUSION ATTACKS

AND DETECTION STATISTICS

In this section, we will analyze the statistical behavior of threedetection statistics under different collusion attacks.

A. Analysis of the Correlation Term Under DifferentCollusion Attacks

In our system model, the extracted fingerprint is. As discussed in the previous section, when

measuring the similarity between and , all three statis-tics are correlation based, and the common kernel term is thelinear correlation

(4)

where is the length of the fingerprint. For different collusionattacks, follows different distributions. This section ana-lyzes the statistical behavior of this correlation term under dif-ferent collusion attacks.

Under the assumption thatare i.i.d. distributed with zero mean and variance ,

are also i.i.d. distributed. From

central limit theorem, if have fi-

nite mean and finite variance , then can be

approximated by

(5)

The problem is reduced to find

and

. We simplify the nota-tion by dropping the subscript . For a given and agiven collusion function , due to the symmetry of

with respect to the user index , allwhere have the same mean and

variance, and similarly, all wherehave the same mean and variance.

For , define

and

(6)

For , because are i.i.d. distributed withzero mean and variance , we have

and

(7)

Therefore, ,

for and

are needed for analyzing thecorrelation term under each collusion attack.

Under the average attack, if , we have

and (8)

Under the minimum attack, given the pdf and cdf of, if the number of colluders is , from the proba-

bility and order statistics theory [27], we can get the pdf of

(9)

From (9), we can calculate the second moment of .For , we can express the joint pdf of andas follows by noticing that breaks into twononzero regions

ifif .

(10)

Consequently,, where

and

(11)

The calculation of is similar.The analysis of the maximum and median attacks follows the

same approach. For the maximum attack, the pdf ofis

(12)

and the joint pdf of and for is

ifif .

(13)

Page 5: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

650 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 5, MAY 2005

Under the median attack, define. If , the pdf of

is

(14)and the joint pdf of and for is shown in(15), at the bottom of the page.

Under the minmax attack, if , we have

and

(16)

The results from the previous analysis on the minimum and themaximum attacks can be applied to (16). In addition, we canfind the correlation between and from their jointpdf

(17)

thus

(18)

The calculation of is similar.

is obtained based on the joint pdf of

, and , which is shown in (19), at the bottomof the page.

The analysis of the modified negative (ModNeg) attack issimilar to that of the minmax attack. If , then thejoint pdf of and and the joint pdf of and

are

(20)

and

(21)

For , the joint pdf of and and thejoint pdf of , and are shown in (22) and (23),respectively, at the bottom of the next page.

Under the randomized negative (RandNeg) attack, we assumethat is independent of . The colluded fingerprint canbe written as ,where is a Bernoulli random variable with parameter andis independent of . The -th moment ( ) of

for and the -th moment ofare

and

(24)

From all the above analysis, the correlation kernel termcan be approximated by the following Gaussian distribution

if

if .(25)

ififif

(15)

ififif .

(19)

Page 6: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

ZHAO et al.: FORENSIC ANALYSIS OF NONLINEAR COLLUSION ATTACKS 651

B. Analysis of the Detection Statistics

From (25), we can approximate the detection statisticsby a Gaussian random variable

if

if .

(26)The statistics can be approximated by a

Gaussian random variable with mean,

where is the mean of defined in (2) and is theestimated correlation coefficient of the extracted fingerprintand the original fingerprint [4]. We can show that

if

if .(27)

Here, for

(28)

where is the variance of the extracted fingerprint.The statistics normalize the correlation term with the unbi-

ased estimate of its variance. So we haveif

if . (29)

C. Analysis of the Performance of Collusion Attacks andDetection Statistics

1) Analysis of , , , and : In our systemmodel with a total of users and colluders, given a signal tobe tested and given one detection statistics, out of the sta-tistics are normally distributed with a positive meanand the others are normally distributed with a zero mean, as an-alyzed in the previous section.

Take the statistics as an example, define, , and .

If are uncorrelated with each other or the correlationis very small, then for a given threshold , we can approximate

and by

and

(30)

where is the Gaussian tail func-tion.

To calculate and , we can have the followingapproximations:

and (31)

The analysis of , , , and for the and statisticsare the same.

2) Perceptual Quality: In our system, the distortion in-troduced to the host signal by the colluded fingerprint is

, . Giventhe collusion attack and the number of colluders , if

has the pdf and isthe absolute value of , we can simplify the and

to

and

(32)

ififif

if(22)

ififif

if

(23)

Page 7: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

652 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 5, MAY 2005

Fig. 1. (a) � , (b) � , (c) � , and (d) � of the unbounded Gaussian fingerprints with � = 1=9.

IV. EFFECTIVENESS OF COLLUSION ATTACKS

ON GAUSSIAN BASED FINGERPRINTS

It has been shown in [4] that the uniform fingerprints can beeasily defeated by nonlinear collusion attacks, and the simula-tion results there also showed that the Gaussian fingerprints aremore resistant to nonlinear collusion attacks than the uniformfingerprints. However, no analytic study was provided in the lit-erature on the resistance of Gaussian fingerprints to nonlinearcollusion attacks. In this section, we study the effectiveness ofnonlinear collusion attacks on Gaussian based fingerprints.

A. Unbounded Gaussian Fingerprints

1) Statistical Analysis: We first study the resistance of un-bounded Gaussian fingerprints to collusion attacks. As before,we assume that there are a total of users and the fingerprints

are i.i.d. Gaussian with zero mean and variance .Usually we take to ensure that around 99.9% offingerprint components are in the range of [ , 1] and are im-perceptible after being scaled by a JND factor.

Under the assumption that the Bernoulli random vari-able in the randomized negative attack is indepen-dent of the zero mean Gaussian fingerprints, we have

for

all possible . Consequently, we have

(33)

and the upper bound of the variance in (33) is achieved whenand . From (30) and (31), the larger

the variance, the more effective the attack. Consequently, wetake in the randomized negative attack and consider themost effective attack.

Given the analysis in the previous section, we can calculatethe parameters , , , and for Gaussian dis-tribution with zero mean and variance . Due to the existenceof the terms in the pdfs and joint pdfs, analytical expres-sions are not available. We use the recursive adaptive Simpsonquadrature method [28] to numerically evaluate the integralswith an absolute error tolerance of and the results for

are plotted in Fig. 1.From Fig. 1, we find that, for a given number of colluders, are the same for all collusion attacks and equal to

. Different collusion attacks have different ,

Page 8: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

ZHAO et al.: FORENSIC ANALYSIS OF NONLINEAR COLLUSION ATTACKS 653

Fig. 2. Perceptual quality of the attacked copy under different attacks with unbounded Gaussian fingerprints. Here, � = 1=9. (Left) MSE =N .(Right) E[F ].

and . The relationship of and for different col-lusion attacks are

and

(34)

and that of is

(35)

Note that the extracted fingerprint under the minimum ormaximum attack is not zero mean. is proportional to thesecond moment of , and is the largest under the minimum,maximum, and randomized negative attacks. However, the vari-ance of under the minimum or maximum attacks is small andcomparable with under the average, median, and minmaxattacks.

In order to compare the effectiveness of different collusionattacks, we define the following notations.

• Attack A Attack B: Attack A is more effective thanattack B in defeating the system.

• Attack A Attack B: Attack A and attack B have thesame performance in defeating the system.

• Attack A Attack B: Attack A and attack B have similarperformance in defeating the system.

From (30), (31), (34), and (35), with the statistics or thestatistics, we can sort different collusion attacks in the de-

scending order of their effectiveness as

(36)

and with the statistics, we can sort different attacks in thedescending order of their effectiveness as

(37)

Therefore, the randomized negative attack is the most effectiveattack.

So far, we have studied the effectiveness of different collu-sion attacks. As for the perceptual quality, Fig. 2 shows the

and of different collusion attacks with i.i.d.fingerprints. As we can see from Fig. 2, although

the minimum, maximum, and randomized negative attacks aremore effective in defeating the fingerprinting system, they alsointroduce larger noticeable distortion that is proportional to thenumber of colluders.

2) Simulation Results: Our simulation is set up as follows.Since the number of embeddable coefficients in 256 256and 512 512 images is usually , we assume that thelength of the fingerprints is 10 000. To accommodate a total of

users, we generate 100 independent fingerprints oflength 10 000. Every fingerprint component is independent ofeach other and follows the Gaussian distribution.Our results are based on a total of 2000 simulation runs.

In Fig. 3(a) and (c), is fixed as and we compareof the and statistics, respectively, under different collu-sion attacks. In Fig. 3(b) and (d), is fixed as and wecompare of the and statistics, respectively, underdifferent attacks. The performance of the statistics is similar tothat of and is not shown here. We compare different detec-tion statistics with in Fig. 3(e) andin Fig. 3(f). Note that in Fig. 3(e) and (f), we only plot the perfor-mance of the minimum and that of the modified negative attackssince the maximum attack yield the same result as the minimumattack and all other attacks have a similar trend.

The simulation results shown in Fig. 3 agree with our anal-ysis. From Fig. 3(a) and (b), with the or statistics, the min-imum, maximum, and randomized negative attack are the mosteffective attacks followed by the modified negative attack. Theaverage, median, and minmax attacks are the least effective at-tacks. From Fig. 3(c) and (d), with the statistics, the random-ized negative attack is the most effective attack followed by themodified negative attack. The average, median, and minmax at-tacks have similar performance and they are the least efficientattacks. The minimum and maximum attacks are the secondleast effective attacks. From Fig. 3(e) and (f), the statistics

Page 9: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

654 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 5, MAY 2005

Fig. 3. (a) P of the T statistics under different attacks, (b) E[F ] of the T statistics under different attacks, (c) P of the Z statistics under different attacks,(d) E[F ] of the Z statistics under different attacks, (e) P of different statistics, and (f) E[F ] of different statistics with unbounded Gaussian fingerprints. Here,� = 1=9, M = 100, and N = 10 . In (a), (c), and (e), P = 10 . In (b), (d), and (f), E[F ] = 10 .

are more resistant to the minimum and maximum attacks thanthe and statistics while the three statistics have similarperformance under other collusion attacks. Therefore, from thecolluders’ point view, the best strategy for them is to choose therandomized negative attack. From the detector’s point of view,the statistics should be used to be more robust against theminimum and maximum attacks.

In Fig. 4, we show the attacked images after the average andthe minimum attacks with 75 colluders. Although the minimum,maximum and randomized negative attacks are more effective,they also introduce much larger noticeable distortion in the hostimage. This is because the fingerprints are not bounded, and infact, such unbounded fingerprints can introduce noticeable dis-tortion in the fingerprinted copies even when without collusion.

Page 10: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

ZHAO et al.: FORENSIC ANALYSIS OF NONLINEAR COLLUSION ATTACKS 655

Fig. 4. Comparison of perceptual quality of the attacked images under different attacks with 75 colluders. Fingerprints are generated from unbounded Gaussiandistribution with � = 1=9. (Left) Zoomed-in region of the original 256� 256 Lena. (Middle) Lena under the average attack. (Right) Lena under the minimumattack.

B. Bounded Gaussian-Like Fingerprints

Compared with uniform fingerprints, Gaussian fingerprintsimprove the detector’s resistance to nonlinear collusion attacks[4] and are resilient to statistical and histogram attacks [20]. Be-cause Gaussian distribution is unbounded, it is possible that theembedded fingerprints exceed the JND and introduce percep-tually distinguishable distortion. However, imperceptibility is arequirement of digital fingerprinting and the owner has to guar-antee the perceptual quality of the fingerprinted copies. In orderto remove the perceptual distortion while maintaining the ro-bustness against collusion attacks, we introduce the boundedGaussian-like fingerprints and study their performance undercollusion attacks.

Assume that and are the pdf and cdf of aGaussian random variable with zero mean and variance ,respectively. The pdf of a bounded Gaussian-like distribution

is

ifotherwise.

(38)

We can show that the variance of fingerprints following pdf(38) is , and the embedded fingerprints introduce no percep-tual distortion since and . By boundingthe fingerprints in the range of [ , 1], we maintain the energyof the embedded fingerprints while achieving the impercepti-bility.

For fingerprints following distribution (38), the analyses ofthe collusion attacks and the detection statistics are similar to theunbounded case and thus omitted. If we sort different collusionattacks according to their effectiveness, the result is the same asthat of the unbounded Gaussian fingerprints.

The simulation of the bounded Gaussian-like fingerprintsunder collusion attacks is set up similarly to that in Sec-tion IV-A.II. Assume that there are a total of usersand the host signal has embeddable coefficients. Thei.i.d. fingerprints are generated from the distribution (38) with

. In Fig. 5(a) and (c), and we compareof the and statistics, respectively, under different

collusion attacks. In Fig. 5(b) and (d), and

we compare of the and statistics, respectively,under different collusion attacks. The performance of thestatistics is similar to that of . We compare the performanceof different detection statistics under the minimum and themodified negative attacks with in Fig. 5(e) and

in Fig. 5(f), respectively. The simulation resultsagree with the analysis and we have the same observations as inthe unbounded case. From the colluders’ point of view, the mostefficient attack is the randomized negative attack, and from thedetector’s point of view, the statistics are more robust.

V. PREROCESSING OF THE EXTRACTED FINGERPRINTS

The three detection statistics we have studied so far are notspecifically designed for collusion scenarios and, therefore, donot take into account the characteristics of the newly generatedcopies after the collusion attacks. Intuitively, utilizing the statis-tical features of the attacked copies may improve the detectionperformance, and one of such features is the sample mean ofthe extracted fingerprint under the collusion attacks. From thehistogram plots of the extracted fingerprints under different at-tacks as shown in Fig. 6, we observe different patterns of thesample means of the extracted fingerprints: the extracted finger-prints have approximately zero sample mean under the average,median, minmax and modified negative attacks; the minimumattack yields a negative sample mean, and the maximum attackyields a positive sample mean; and under the randomized neg-ative attack, the histogram of the extracted fingerprint compo-nents have two clusters, one with a negative mean and the otherwith a positive mean.

Recall from Section III-A that is proportional tothe second moment of the extracted fingerprint, subtractingthe sample mean from the extracted fingerprint will reduceits second-order moment, thus help improve the detectionperformance. Similarly, the detection performance under therandomized negative attack can be improved by decreasing

and .Motivated by this analysis, we propose a preprocessing

stage in the detection process: given the extracted finger-print , we first investigate its histogram.If a single nonzero sample mean is observed, we subtract

Page 11: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

656 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 5, MAY 2005

Fig. 5. (a) P of the T statistics under different attacks, (b) E[F ] of the T statistics under different attacks, (c) P of the Z statistics under different attacks,(d) E[F ] of the Z statistics under different attacks, (e) P of different statistics, and (f) E[F ] of different statistics with bounded Gaussian-like fingerprints.Here, � = 1=9, M = 100, and N = 10 . In (a), (c), and (e), P = 10 . In (b), (d), and (f), E[F ] = 10 .

it from the extracted fingerprint, and then apply the de-tection statistics. If the fingerprint components are mergedfrom two (or more) distributions that have distinct meanvalues, we need to cluster components and then subtractfrom each colluded fingerprint component the sample meanof the corresponding cluster. In the later case, the means

can be estimated using a Gaussian-mixture approximation,and the clustering is based on the nearest-neighbor prin-ciple. In our problem, under the randomized negative attack,a simple solution is to first observe the bi-modality in thehistogram of , and then cluster all negative componentsinto one distribution and cluster all positive components

Page 12: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

ZHAO et al.: FORENSIC ANALYSIS OF NONLINEAR COLLUSION ATTACKS 657

Fig. 6. Histograms of the extracted fingerprints under the average, minimum and randomized negative attacks, respectively. The original fingerprints follow thedistribution in (38) with � = 1=9. N = 10 and K = 45.

Fig. 7. (a)P under the minimum attack, (b)E[F ] under the minimum attack, (c)P under the randomized negative attack, and (d)E[F ] under the randomizednegative attack with and without preprocessing. Fingerprints are generated from bounded Gaussian-like distribution (38) with � = 1=9.M = 100 and N =10 . In (a) and (c), P = 10 . In (b) and (d), E[F ] = 10 .

into the other distribution. Given the extracted fingerprint, define

as the sample mean of the negative components of the ex-tracted fingerprint where is the indication function, and

as the sample mean

of the positive components of the extracted fingerprint. Thenthe preprocessing stage generates

ifif (39)

Page 13: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

658 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 5, MAY 2005

Fig. 8. (a) P of Lena, (b) E[F ] of Lena, (c) P of Baboon, and (d) E[F ] of Baboon with the Z statistics under different collusion attacks. The originalfingerprints follow the distribution in (38) with � = 1=9. M = 100. In (a) and (b), the length of the embedded fingerprints is N = 13691. In (c) and (d),the length of the embedded fingerprints is N = 19497. In (a) and (c), P = 10 and simulation results are based on 10,000 simulation runs. In (b) and (d),E[F ] = 10 and simulation results are based on 1,000 simulation runs.

and the detector applies the detection statistics to . Theanalysis of the detection statistics with the preprocessing is thesame as in Section III and is not repeated.

The simulation is set up the same as before and the finger-print components are generated from the bounded Gaussian-likedistribution (38) with . In Fig. 7(a) and (c), with

, we compare of the three statistics with andwithout the preprocessing under the minimum and the random-ized negative attacks, respectively. In Fig. 7(b) and (d), with

, we compare of the three statistics withand without the preprocessing under the minimum and the ran-domized negative attacks, respectively. The detection perfor-mance under the maximum attack is the same as that of the min-imum attack and is not shown here. We can see that the prepro-cessing substantially improves the detection performance of thedetector, and the three statistics have similar performance underthe minimum, maximum, and randomized negative attacks.

Note that the estimated correlation coefficient in thestatistics removes the mean of the extracted fingerprint beforecalculating the correlation between the extracted fingerprint andthe original fingerprint. This explains why the statistics per-form better than the and statistics without preprocessing

under the minimum and maximum attacks, whereby the meanof the colluded fingerprint components is substantially deviatedfrom zero.

VI. SIMULATION RESULTS ON REAL IMAGES

To study the performance of Gaussian based fingerprintsunder different nonlinear collusion attacks on real images, wechoose two 256 256 host images, Lena and Baboon, whichhave a variety of representative visual features such as thetexture, sharp edges, and smooth areas. We use the humanvisual model based spread spectrum embedding in [23], andembed the fingerprints in the DCT domain. The generatedfingerprints follow the bounded Gaussian-like distribution (38)with . We assume that the collusion attacks are alsoin the DCT domain. At the detector’s side, a nonblind detectionis performed where the host signal is first removed from thecolluded copy. Then the detector applies the preprocessing tothe extracted fingerprint if a nonzero sample mean is observed.Finally, the detector uses the detection statistics to identify thecolluders.

Page 14: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

ZHAO et al.: FORENSIC ANALYSIS OF NONLINEAR COLLUSION ATTACKS 659

Fig. 8 shows the simulation results of the statistics. Theand statistics have similar performance and are not shown

here. We assume that there are a total of users. InFig. 8(a) and (c), we fix and compare of Lenaand Baboon, respectively, under different nonlinear collusion at-tacks. In Fig. 8(b) and (d), we fix and compare

of Lena and Baboon, respectively, under different non-linear collusion attacks. The simulation results from real imagesagree with our analysis in Section III, and are comparable tothe simulation results in Sections IV and V. In addition, a betterperformance is observed in the Baboon example than in Lena.This is because the length of the embedded fingerprints in Ba-boon, which is , is larger than that in Lena, whichis . Different characteristics of the two images, e.g.,smooth regions and the texture, also contribute to the differencein performance.

VII. A FEW MORE COLLUSION ATTACKS

Besides of the attacks listed in (1), we further consider a fewother possible collusion attacks. One of them is the copy andpaste attack where in generating each component of the attackedcopy , the colluders equiprobably choose one of the dif-ferent copies and take that value as . In terms ofthe effects on the energy reduction of the original fingerprintsand the effect it has upon the detection performance, this attackand the average attack have similar performance.

Another possible attack is on bounded fingerprints. Sinceall the embedded fingerprints are within the range of

, so are the minimum and the maximum ofthese copies. The minimum and the maximum values alsotell the colluders the lower and upper bounds of the pos-sible fingerprints that will not introduce noticeable distortion.The colluders can randomly choose any value between theminimum and the maximum as the colluded copy withoutintroducing perceptual distortion. We call it the uniformattack, which can be modeled as the minmax attack fol-lowed by an additive noise . The extracted fingerprint is

where is uniformlydistributed in .When is large, are approximately uniformly distributedin [ , 1]. Note that in addition to the collusion functions listedin (1), the colluders can also add another additive noise to theattacked copy, as long as the overall distortion introduced inthe host signal (the extracted fingerprint plus the additive noisein this case) is bounded by JND. This additional noise willhinder the detection performance without degrading the per-ceptual quality of the attacked signal. We can show that givena fixed power of the overall noise introduced in the host signal,different collusion attacks have comparable performance indefeating the fingerprinting systems.

VIII. CONCLUSION

In this paper, we have provided theoretical analysis on theeffectiveness of different collusion attacks and studied the per-

ceptual quality of the attacked signals under different collusionattacks. We have also studied several commonly used detectionstatistics and compared their performance under collusion at-tacks. Furthermore, we have proposed the preprocessing tech-niques specifically for collusion scenarios to improve the detec-tion performance.

We first studied the effectiveness of average and variousbasic nonlinear collusion attacks with unbounded Gaussianfingerprints. From both our analytical and simulation results,we found that with the three detection statistics as defined in theliterature and without any modification, the randomized nega-tive attack is the most effective attack against the fingerprintingsystem. We showed that the statistics are more robust againstthe minimum and maximum attacks than the other two statisticsby implicitly removing the mean of the extracted fingerprint.We also showed that all three statistics have similar perfor-mance under other collusion attacks. However, the unboundedGaussian fingerprints may exceed JND and introduce percep-tual distortion in the host signal even when without collusion,and the minimum, maximum, and randomized negative attacksintroduce much larger distortion in the attacked copies thanothers.

In order to remove the noticeable distortion introduced bythe unbounded fingerprints, we proposed the bounded Gaussian-like fingerprints, which maintain the robustness against the col-lusion attacks. With the bounded Gaussian-like fingerprints, therandomized negative attack is still the most effective attack, andthe statistic are more robust against the minimum and max-imum attacks than the other two statistics. The bounding im-proves the perceptual quality of the fingerprinted copies and thatof the attacked copies, and both the fingerprint designer and thecolluders do not introduce noticeable distortion.

Observing that the extracted fingerprints under the minimumand the maximum attacks do not have a zero mean, we proposedthe preprocessing of the extracted fingerprints, which removesthe mean from the extracted fingerprints before applying the de-tection statistics. We also applied preprocessing to the extractedfingerprints after the randomized negative attacks, which havedistinct bimodal distribution as opposed to the single modalityunder other collusions. We showed that these preprocessingtechniques improve the detection performance, and all detec-tion statistics give similar performance after preprocessing.

We have also studied the effectiveness of different collusionattacks and the performance of different statistics on real im-ages. Our real image simulation results agree with our analysisand are comparable with the ideal case simulation results.

ACKNOWLEDGMENT

The authors would like to thank Dr. W. Trappe at WINLAB,ECE Department, Rutgers University, for his constructive sug-gestions and inspiring discussions.

REFERENCES

[1] I. Cox, J. Bloom, and M. Miller, Digital Watermarking: Principles andPractice. San Mateo, CA: Morgan Kaufmann, 2001.

Page 15: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

660 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 5, MAY 2005

[2] F. Petitcolas, R. Anderson, and M. Kuhn, “Information hiding – Asurvey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999.

[3] G. C. Langelaar, I. Setyawan, and R. Lagendijk, “Watermarking dig-ital image and video data: A state-of-the-art overview,” IEEE SignalProcess. Mag., vol. 17, no. 9, pp. 20–46, Sep. 2000.

[4] H. Stone, “Analysis of Attacks on image watermarks with randomizedcoefficients,” NEC Res. Inst., Tech. Rep. 96–045, 1996.

[5] W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, “Anti-collusion figer-printing for multimedia,” IEEE Trans. Signal Process., vol. 51, no. 4, pp.1069–1087, Apr. 2003.

[6] F. Petitcolas, R. Anderson, and M. Kuhn, “Attacks on copyright markingsystems,” in Proc. 2nd Workshop Information Hiding, Apr. 1998, pp.218–238.

[7] I. Cox and J. Linnartz, “Some general methods for tampering with wa-termaking,” IEEE J. Sel. Areas Commun., vol. 16, no. 5, pp. 587–593,May 1998.

[8] F. Hartung, J. Su, and B. Girod, “Spread spectrum watermarking:Malicious attacks and counterattacks,” Proc. SPIE, pp. 147–158, Jan.1999.

[9] D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,”IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897–1905, Sep. 1998.

[10] B. Chor, A. Fiat, and M. Manor, “Tracing traitors,” IEEE Trans. Inf.Theory, vol. 46, no. 3, pp. 893–910, May 2000.

[11] Y. Yacobi, “Improved Boneh-Shaw content fingerprinting,” in Proc. TheCryptographer’s Track at RSA Conf., vol. 2020, 2001, pp. 378–391.

[12] A. Fiat and T. Tassa, “Dynamic tracing traitors,” in Proc. Advances, vol.1666, 1999, pp. 354–371.

[13] B. Pfitzmann and M. Waidner, “Asymmetric fingerprinting for larger col-lusions,” in Proc. 4th ACM Conf. Computer and Communication Secu-rity, 1997, pp. 151–160.

[14] F. Zane, “Efficient watermark detection and collusion security,” in Proc.Financial Cryptography, vol. 1962, Feb. 2000, pp. 21–32.

[15] I. Cox, J. Killian, F. Leighton, and T. Shamoon, “Secure spread spectrumwatermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no.12, pp. 1673–1687, Dec. 1997.

[16] J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg, “Com-bining digital watermarks and collusion secure fingerprints for digitalimages,” SPIE J. Electron. Imag., vol. 9, no. 4, pp. 456–467, Oct.2000.

[17] F. Ergun, J. Killian, and R. Kumar, “A note on the limits of collusion-resistant watermarks,” in Proc. Advances in Cryptology, vol. 1592, 2001,pp. 140–149.

[18] J. Killian, T. Leighton, L. R. Matheson, T. G. Shamoon, R. Tajan, andF. Zane, “Resistance of digital watermarks to collusive attacks,” Dep.Comp Sci., Princeton Univ., Tech. Rep. TR-585–98, 1998.

[19] J. Su, J. Eggers, and B. Girod, “Capacity of digital watermarks subjectto an optimal collusion attacks,” presented at the Eur. Signal ProcessingConf., 2000.

[20] S. Craver, B. Liu, and W. Wolf, “Histo-cepstral analysis for reverse-en-gineering watermarks,” in Proc. 38th Conf. Information Sciences andSystems, Mar. 2004, pp. 824–826.

[21] H. V. Poor, An Introducton to Signal Detection and Estimation, 2nded. New York: Springer-Verlag, 1999.

[22] W. Zeng and B. Liu, “A statistical watermark detection techniquewithout using original images for resolving right ownerships of digitalimages,” IEEE Trans. Image Process., vol. 8, no. 11, pp. 1534–1548,Nov. 1999.

[23] C. Podilchuk and W. Zeng, “Image adaptive watermarking using visualmodels,” IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 525–540, May1998.

[24] C. Lin, M. Wu, J. Bloom, M. Miller, I. Cox, and Y. Liu, “Rotation, scale,and translation resilient public watermarking for images,” IEEE Trans.Image Process., vol. 10, no. 5, pp. 767–782, May 2001.

[25] J. Lubin, J. Bloom, and H. Cheng, “Robust, content-dependent, high-fidelity watermark for tracking in digital cinema,” Proc. SPIE, vol. 5020,pp. 536–545, Jun. 2003.

[26] Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. R. Liu, “Resistanceof orthogonal Gaussian fingerprints to collusion attacks,” in Proc. IEEEInt. Conf. Acoustics, Speech, Signal Processing, vol. IV, Apr. 2003, pp.724–727.

[27] H. A. David, Order Statistics, 2nd ed. New York: Wiley, 1981.[28] W. Gander and W. Gautschi, “Adaptive quadrature – Revised,” BIT, vol.

40, no. 1, pp. 84–101, Mar. 2000.

[29] M. Wu, W. Trappe, Z. J. Wang, K. J. R. Liu, and W. Gautschi, “Collusionresistant fingerprint for multimedia,” IEEE Signal Process. Mag., no. 3,pp. 15–27, Mar. 2004.

[30] H. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, “Nonlinear collusionattacks on digital fingerprinting,” in Proc. IEEE Int. Conf. Acoustics,Speech, Signal Processing, vol. 5, Apr. 2003, pp. 664–667.

[31] H. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, “Performance of de-tection statistics under collusion attacks on independent multimedia fin-gerprints,” in Proc. IEEE Int. Conf. Multimedia, vol. 1, Jul. 2003, pp.205–208.

[32] Z. J. Wang, M. Wu, W. Trappe, and K. J. R. Liu, “Anti-collusion ofgroup-oriented fingerprinting,” in Proc. IEEE Int. Conf. Multimedia, vol.1, Jul. 2003, pp. 217–220.

[33] Z. J. Wang, M. Wu, W. Trappe, and K. J. R. Liu, “Group-oriented finger-printing for multimedia forensics,” EURASIP J. Appl. Signal Process.,pp. 2142–2162, Nov. 2004.

H. Vicky Zhao (S’02–M’05) received the B.S. andM.S. degrees from Tsinghua University, Beijing,China, in 1997 and 1999, respectively, and the Ph.D.degree from the University of Maryland, CollegePark, in 2004, all in electrical engineering.

Since 2005, she has been a Research Associatewith the Department of Electrical and ComputerEngineering and Institute for Systems Research,University of Maryland. Her research interestsinclude multimedia security, digital rights manage-ment, multimedia communication over networks,

and multimedia signal processing.

Min Wu (S’95–M’01) received the B.Eng. degreein electrical engineering and the B.A. degree ineconomics (both with the highest honors) fromTsinghua University, Beijing, China, in 1996 andthe M.A. degree and Ph.D. degree in electricalengineering from Princeton University, Princeton,NJ, in 1998 and 2001, respectively.

She was with NEC Research Institute, Princeton,NJ, in 1998 and Panasonic Information and Net-working Laboratories, Princeton, in 1999. Since2001, she has been an Assistant Professor with the

Department of Electrical and Computer Engineering, Institute of AdvancedComputer Studies and the Institute of Systems Research, University ofMaryland, College Park. She is a Guest Editor of the Special Issue on MediaSecurity and Rights Management for the EURASIP Journal on Applied SignalProcessing. She co-authored the book Multimedia Data Hiding (New York:Springer-Verlag, 2003) and holds four U.S. patents on multimedia security. Herresearch interests include information security, multimedia signal processing,and multimedia communications.

Dr. Wu received a CAREER award from the U.S. National Science Foun-dation in 2002, a George Corcoran Faculty Award from University of Mary-land in 2003, a TR100 Young Innovator Award from MIT Technology ReviewMagazine in 2004, and a Young Investigator Award from U.S. Office of NavalResearch in 2005. She is a member of the IEEE Technical Committee on Mul-timedia Signal Processing and was the Publicity Chair of the 2003 IEEE Inter-national Conference on Multimedia and Expo.

Page 16: 646 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. …zjanew/journal/ZJW_IP_NCAMFingerprint_19.pdf · return the minimum, the maximum and the median values of , respectively

ZHAO et al.: FORENSIC ANALYSIS OF NONLINEAR COLLUSION ATTACKS 661

Z. Jane Wang (M’02) received the B.Sc. degree(with the highest honors) from Tsinghua University,Beijing, China, in 1996 and the M.Sc. and Ph.D.degrees from the University of Connecticut, Storrs,in 2000 and 2002, respectively, all in electricalengineering.

She has been a Research Associate with theElectrical and Computer Engineering Department,Institute for Systems Research at the University ofMaryland, College Park. Since August 2004, shehas been an Assistant Professor with the Depart-

ment Electrical and Computer Engineering, University of British Columbia,Vancouver, BC, Canada. Her research interests are in the broad areas of statis-tical signal processing, with applications to information security, biomedicalimaging, genomic, and wireless communications.

Dr. Wang received the Outstanding Engineering Doctoral Student Awardwhile at the University of Connecticut.

K. J. Ray Liu (F’03) received the B.S. degree fromthe National Taiwan University, Taiwan, R.O.C., in1983 and the Ph.D. degree from the University ofCalifornia, Los Angeles, in 1990, both in electricalengineering.

He is a Professor and Director of Communicationsand Signal Processing Laboratories of Electrical andComputer Engineering Department and Institute forSystems Research, University of Maryland, CollegePark. He was the founding Editor-in-Chief of theEURASIP Journal on Applied Signal Processing.

His research contributions encompass broad aspects of information forensicsand security; wireless communications and networking; multimedia communi-cations and signal processing; signal processing algorithms and architectures;and bioinformatics, in which he has published over 350 refereed papers.

Dr. Liu is the recipient of numerous honors and awards, including the IEEESignal Processing Society’s 2004 Distinguished Lecturer; the 1994 NationalScience Foundation’s Young Investigator Award; the IEEE Signal ProcessingSociety’s 1993 Senior Award (Best Paper Award); the IEEE 50th VehicularTechnology Conference Best Paper Award, Amsterdam, The Netherlands,1999; and the EURASIP 2004 Meritorious Service Award. He also receivedthe George Corcoran Award in 1994 for outstanding contributions to electricalengineering education and the Outstanding Systems Engineering FacultyAward in 1996 in recognition for outstanding contributions in interdisciplinaryresearch, both from the University of Maryland. He is the Editor-in-Chief ofIEEE Signal Processing Magazine, the prime proposer and architect of the newIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, and was thefounding Editor-in-Chief of EURASIP Journal on Applied Signal Processing.He is a member of Board of Governors of IEEE Signal Processing Society.