A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding
Recently, Celik <italic>et al.</italic> proposed a lookup-table (LUT)-based embedding mechanism for spread-spectrum watermarks, in which the content distribution server sends an encrypted content to the client, then the client uses his or her personalized decryption LUT to decrypt the re...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8283552/ |
_version_ | 1818329575950647296 |
---|---|
author | Yuan-Gen Wang Dongqing Xie Brij B. Gupta |
author_facet | Yuan-Gen Wang Dongqing Xie Brij B. Gupta |
author_sort | Yuan-Gen Wang |
collection | DOAJ |
description | Recently, Celik <italic>et al.</italic> proposed a lookup-table (LUT)-based embedding mechanism for spread-spectrum watermarks, in which the content distribution server sends an encrypted content to the client, then the client uses his or her personalized decryption LUT to decrypt the received content, meanwhile embeds his or her personalized watermark into the content. They also provided a brief analysis on the security of the LUT-based embedding in terms of the collusion attack on watermarked contents. However, we find that the LUT-based embedding is vulnerable to not only the collusion attack on watermarked contents but the collusion attack on decryption LUTs as well, due to the fact all clients share the same long-term encryption LUT. In this paper, we present a theoretical analysis on the collusion security of the LUT-based embedding mechanism. The analysis shows that the collusion attack on decryption LUTs is more effective than the collusion attack on watermarked contents. Based on our analysis, the content distribution system proposed by Celik <italic>et al.</italic> can only be used for package sale, which limits its applications. In order to extend the applications, we suggest that the encryption and decryption LUTs of the LUT-based client-side embedding should be set as short-term keys instead of long-term keys. Finally, simulations are carried out to illustrate and validate our theoretical analysis. |
first_indexed | 2024-12-13T12:50:15Z |
format | Article |
id | doaj.art-21b441ecb76143388111597f1b10c612 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-13T12:50:15Z |
publishDate | 2018-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-21b441ecb76143388111597f1b10c6122022-12-21T23:45:21ZengIEEEIEEE Access2169-35362018-01-016158161582210.1109/ACCESS.2018.28029288283552A Study on the Collusion Security of LUT-Based Client-Side Watermark EmbeddingYuan-Gen Wang0Dongqing Xie1https://orcid.org/0000-0003-2084-3075Brij B. Gupta2School of Computer Science, Guangzhou University, Guangzhou, ChinaSchool of Computer Science, Guangzhou University, Guangzhou, ChinaNational Institute of Technology, Kurukshetra, IndiaRecently, Celik <italic>et al.</italic> proposed a lookup-table (LUT)-based embedding mechanism for spread-spectrum watermarks, in which the content distribution server sends an encrypted content to the client, then the client uses his or her personalized decryption LUT to decrypt the received content, meanwhile embeds his or her personalized watermark into the content. They also provided a brief analysis on the security of the LUT-based embedding in terms of the collusion attack on watermarked contents. However, we find that the LUT-based embedding is vulnerable to not only the collusion attack on watermarked contents but the collusion attack on decryption LUTs as well, due to the fact all clients share the same long-term encryption LUT. In this paper, we present a theoretical analysis on the collusion security of the LUT-based embedding mechanism. The analysis shows that the collusion attack on decryption LUTs is more effective than the collusion attack on watermarked contents. Based on our analysis, the content distribution system proposed by Celik <italic>et al.</italic> can only be used for package sale, which limits its applications. In order to extend the applications, we suggest that the encryption and decryption LUTs of the LUT-based client-side embedding should be set as short-term keys instead of long-term keys. Finally, simulations are carried out to illustrate and validate our theoretical analysis.https://ieeexplore.ieee.org/document/8283552/Watermarkbusiness modelsecuritylookup-table (LUT)copyright protection |
spellingShingle | Yuan-Gen Wang Dongqing Xie Brij B. Gupta A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding IEEE Access Watermark business model security lookup-table (LUT) copyright protection |
title | A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding |
title_full | A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding |
title_fullStr | A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding |
title_full_unstemmed | A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding |
title_short | A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding |
title_sort | study on the collusion security of lut based client side watermark embedding |
topic | Watermark business model security lookup-table (LUT) copyright protection |
url | https://ieeexplore.ieee.org/document/8283552/ |
work_keys_str_mv | AT yuangenwang astudyonthecollusionsecurityoflutbasedclientsidewatermarkembedding AT dongqingxie astudyonthecollusionsecurityoflutbasedclientsidewatermarkembedding AT brijbgupta astudyonthecollusionsecurityoflutbasedclientsidewatermarkembedding AT yuangenwang studyonthecollusionsecurityoflutbasedclientsidewatermarkembedding AT dongqingxie studyonthecollusionsecurityoflutbasedclientsidewatermarkembedding AT brijbgupta studyonthecollusionsecurityoflutbasedclientsidewatermarkembedding |