Content authentication and identification under informed attacks

F. Beekhof, S. Voloshynovskiy, F. Farhadzadeh

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Abstract

We consider the problem of content identification and authentication based on digital content fingerprinting. Contrary to existing work in which the performance of these systems under blind attacks is analysed, we investigate the information-theoretic performance under informed attacks. In the case of binary content fingerprinting, in a blind attack, a probe is produced at random independently from the fingerprints of the original contents. Contrarily, informed attacks assume that the attacker might have some information about the original content and is thus able to produce a counterfeit probe that is related to an authentic fingerprint corresponding to an original item, thus leading to an increased probability of false acceptance. We demonstrate the impact of the ability of an attacker to create counterfeit items whose fingerprints are related to fingerprints of authentic items, and consider the influence of the length of the fingerprint on the performance of finite-length systems. Finally, the information-theoretic achieveble rate of content identification systems sustaining informed attacks is derived under asymptotic assumptions about the fingerprint length.
Original languageEnglish
Title of host publication2012 IEEE International Workshop on Information Forensics and Security (WIFS)
Place of PublicationTenerife, Spain
PublisherInstitute of Electrical and Electronics Engineers
Pages133-138
ISBN (Print)978-1-4673-2286-7
DOIs
Publication statusPublished - 2012

Fingerprint

Dive into the research topics of 'Content authentication and identification under informed attacks'. Together they form a unique fingerprint.

Cite this