A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding

Recently, Celik <italic>et al.</italic> proposed a lookup-table (LUT)-based embedding mechanism for spread-spectrum watermarks, in which the content distribution server sends an encrypted content to the client, then the client uses his or her personalized decryption LUT to decrypt the re...

Full description

Bibliographic Details
Main Authors: Yuan-Gen Wang, Dongqing Xie, Brij B. Gupta
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8283552/
_version_ 1818329575950647296
author Yuan-Gen Wang
Dongqing Xie
Brij B. Gupta
author_facet Yuan-Gen Wang
Dongqing Xie
Brij B. Gupta
author_sort Yuan-Gen Wang
collection DOAJ
description Recently, Celik <italic>et al.</italic> proposed a lookup-table (LUT)-based embedding mechanism for spread-spectrum watermarks, in which the content distribution server sends an encrypted content to the client, then the client uses his or her personalized decryption LUT to decrypt the received content, meanwhile embeds his or her personalized watermark into the content. They also provided a brief analysis on the security of the LUT-based embedding in terms of the collusion attack on watermarked contents. However, we find that the LUT-based embedding is vulnerable to not only the collusion attack on watermarked contents but the collusion attack on decryption LUTs as well, due to the fact all clients share the same long-term encryption LUT. In this paper, we present a theoretical analysis on the collusion security of the LUT-based embedding mechanism. The analysis shows that the collusion attack on decryption LUTs is more effective than the collusion attack on watermarked contents. Based on our analysis, the content distribution system proposed by Celik <italic>et al.</italic> can only be used for package sale, which limits its applications. In order to extend the applications, we suggest that the encryption and decryption LUTs of the LUT-based client-side embedding should be set as short-term keys instead of long-term keys. Finally, simulations are carried out to illustrate and validate our theoretical analysis.
first_indexed 2024-12-13T12:50:15Z
format Article
id doaj.art-21b441ecb76143388111597f1b10c612
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-13T12:50:15Z
publishDate 2018-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-21b441ecb76143388111597f1b10c6122022-12-21T23:45:21ZengIEEEIEEE Access2169-35362018-01-016158161582210.1109/ACCESS.2018.28029288283552A Study on the Collusion Security of LUT-Based Client-Side Watermark EmbeddingYuan-Gen Wang0Dongqing Xie1https://orcid.org/0000-0003-2084-3075Brij B. Gupta2School of Computer Science, Guangzhou University, Guangzhou, ChinaSchool of Computer Science, Guangzhou University, Guangzhou, ChinaNational Institute of Technology, Kurukshetra, IndiaRecently, Celik <italic>et al.</italic> proposed a lookup-table (LUT)-based embedding mechanism for spread-spectrum watermarks, in which the content distribution server sends an encrypted content to the client, then the client uses his or her personalized decryption LUT to decrypt the received content, meanwhile embeds his or her personalized watermark into the content. They also provided a brief analysis on the security of the LUT-based embedding in terms of the collusion attack on watermarked contents. However, we find that the LUT-based embedding is vulnerable to not only the collusion attack on watermarked contents but the collusion attack on decryption LUTs as well, due to the fact all clients share the same long-term encryption LUT. In this paper, we present a theoretical analysis on the collusion security of the LUT-based embedding mechanism. The analysis shows that the collusion attack on decryption LUTs is more effective than the collusion attack on watermarked contents. Based on our analysis, the content distribution system proposed by Celik <italic>et al.</italic> can only be used for package sale, which limits its applications. In order to extend the applications, we suggest that the encryption and decryption LUTs of the LUT-based client-side embedding should be set as short-term keys instead of long-term keys. Finally, simulations are carried out to illustrate and validate our theoretical analysis.https://ieeexplore.ieee.org/document/8283552/Watermarkbusiness modelsecuritylookup-table (LUT)copyright protection
spellingShingle Yuan-Gen Wang
Dongqing Xie
Brij B. Gupta
A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding
IEEE Access
Watermark
business model
security
lookup-table (LUT)
copyright protection
title A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding
title_full A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding
title_fullStr A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding
title_full_unstemmed A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding
title_short A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding
title_sort study on the collusion security of lut based client side watermark embedding
topic Watermark
business model
security
lookup-table (LUT)
copyright protection
url https://ieeexplore.ieee.org/document/8283552/
work_keys_str_mv AT yuangenwang astudyonthecollusionsecurityoflutbasedclientsidewatermarkembedding
AT dongqingxie astudyonthecollusionsecurityoflutbasedclientsidewatermarkembedding
AT brijbgupta astudyonthecollusionsecurityoflutbasedclientsidewatermarkembedding
AT yuangenwang studyonthecollusionsecurityoflutbasedclientsidewatermarkembedding
AT dongqingxie studyonthecollusionsecurityoflutbasedclientsidewatermarkembedding
AT brijbgupta studyonthecollusionsecurityoflutbasedclientsidewatermarkembedding