{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:52Z","timestamp":1750307092068,"version":"3.41.0"},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"2S","license":[{"start":{"date-parts":[[2012,9,1]],"date-time":"2012-09-01T00:00:00Z","timestamp":1346457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["60873226 and 60803112"],"award-info":[{"award-number":["60873226 and 60803112"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2012,9]]},"abstract":"<jats:p>\n            Collusion attack is a cost-efficient attack for digital fingerprinting. In this article, we propose a novel collusion attack strategy,\n            <jats:italic>Iterative Optimization Collusion Attack (IOCA)<\/jats:italic>\n            , which is based upon the gradient attack and the principle of informed watermark embedding. We evaluate the performance of the proposed collusion attack strategy in defeating four typical fingerprinting schemes under a well-constructed evaluation framework. The simulation results show that the proposed strategy performs more effectively than the gradient attack, and adopting no more than three fingerprinted copies can sufficiently collapse examined fingerprinting schemes. Meanwhile, the content resulted from the proposed attack still preserves high perceptual quality.\n          <\/jats:p>","DOI":"10.1145\/2344436.2344442","type":"journal-article","created":{"date-parts":[[2012,9,18]],"date-time":"2012-09-18T14:51:51Z","timestamp":1347979911000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A collusion attack optimization strategy for digital fingerprinting"],"prefix":"10.1145","volume":"8","author":[{"given":"Hui","family":"Feng","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, Hubei, China"}]},{"given":"Hefei","family":"Ling","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Hubei, China"}]},{"given":"Fuhao","family":"Zou","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Hubei, China"}]},{"given":"Weiqi","family":"Yan","sequence":"additional","affiliation":[{"name":"Queen's University Belfast, UK"}]},{"given":"Zhengding","family":"Lu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2012,9,20]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_1_1_1","DOI":"10.1109\/18.705568"},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.1109\/LSP.2004.835475"},{"doi-asserted-by":"publisher","key":"e_1_2_1_3_1","DOI":"10.1109\/TIFS.2009.2025849"},{"doi-asserted-by":"publisher","key":"e_1_2_1_4_1","DOI":"10.1109\/83.650120"},{"key":"e_1_2_1_5_1","volume-title":"Digital Watermarking: Principles and Practice. Morgan Kaufman.","author":"Cox I. J. B.","year":"2001","unstructured":"Cox , I. J. B. and Miller , M . 2001 . Digital Watermarking: Principles and Practice. Morgan Kaufman. Cox, I. J. B. and Miller, M. 2001. Digital Watermarking: Principles and Practice. Morgan Kaufman."},{"doi-asserted-by":"crossref","unstructured":"Ergun F. Kilian J. and Kumar R. 1999. A note on the limits of collusion-resistant watermarks. In Lecture Notes in Computer Science. 140--149.   Ergun F. Kilian J. and Kumar R. 1999. A note on the limits of collusion-resistant watermarks. In Lecture Notes in Computer Science. 140--149.","key":"e_1_2_1_6_1","DOI":"10.1007\/3-540-48910-X_10"},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.5555\/1683297.1683345"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1145\/1873951.1874073"},{"volume-title":"Department of Computer Science and Engineering","author":"Ground","unstructured":"Ground truth database 2009. Department of Computer Science and Engineering , University of Washington , http:\/\/www.cs. washington.edu\/research\/imagedatabase\/. Ground truth database 2009. Department of Computer Science and Engineering, University of Washington, http:\/\/www.cs. washington.edu\/research\/imagedatabase\/.","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'07)","volume":"2","author":"He S.","unstructured":"He , S. , Kirovski , D. , and Wu , M . 2007. Colluding fingerprinted video using the gradient attack . In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'07) . Vol. 2 ., II--161--II--164. He, S., Kirovski, D., and Wu, M. 2007. Colluding fingerprinted video using the gradient attack. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'07). Vol. 2., II--161--II--164."},{"doi-asserted-by":"publisher","key":"e_1_2_1_11_1","DOI":"10.1145\/1073170.1073194"},{"doi-asserted-by":"publisher","key":"e_1_2_1_12_1","DOI":"10.1007\/11551492_7"},{"doi-asserted-by":"publisher","key":"e_1_2_1_13_1","DOI":"10.1109\/TIFS.2006.873597"},{"doi-asserted-by":"publisher","key":"e_1_2_1_14_1","DOI":"10.1109\/TIFS.2007.908179"},{"volume-title":"Proceedings of the IEEE International Symposium on Information Theory. 271","author":"Kilian J.","unstructured":"Kilian , J. , Leighton , F. T. , Matheson , L. R. , Shamoon , T. G. , Tarjan , R. E. , and Zane , F . 1998. Resistance of digital watermarks to collusive attacks . In Proceedings of the IEEE International Symposium on Information Theory. 271 . Kilian, J., Leighton, F. T., Matheson, L. R., Shamoon, T. G., Tarjan, R. E., and Zane, F. 1998. Resistance of digital watermarks to collusive attacks. In Proceedings of the IEEE International Symposium on Information Theory. 271.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing.","volume":"2","author":"Kirovski D.","unstructured":"Kirovski , D. and Mihcak , M. K . 2005. Bounded gaussian fingerprints and the gradient collusion attack . In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. Vol. 2 . 1037--1040. Kirovski, D. and Mihcak, M. K. 2005. Bounded gaussian fingerprints and the gradient collusion attack. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. Vol. 2. 1037--1040."},{"volume-title":"Proceedings of the 40th Annual Conference on Information Sciences and Systems. 1170--1175","author":"Kiyavash N.","unstructured":"Kiyavash , N. and Moulin , P . 2006. A framework for optimizing nonlinear collusion attacks on fingerprinting systems . In Proceedings of the 40th Annual Conference on Information Sciences and Systems. 1170--1175 . Kiyavash, N. and Moulin, P. 2006. A framework for optimizing nonlinear collusion attacks on fingerprinting systems. In Proceedings of the 40th Annual Conference on Information Sciences and Systems. 1170--1175.","key":"e_1_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1109\/TIFS.2009.2026462"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the International Workshop on Digital Water-marking (IWDW). Lecture Notes in Computer Science","volume":"6526","author":"Ling H.","unstructured":"Ling , H. , Feng , H. , Zou , F. , Yan , W. , and Lu , Z . 2010. A novel collusion attack strategy for digital fingerprinting . In Proceedings of the International Workshop on Digital Water-marking (IWDW). Lecture Notes in Computer Science , vol. 6526 . Springer, 224--238. Ling, H., Feng, H., Zou, F., Yan, W., and Lu, Z. 2010. A novel collusion attack strategy for digital fingerprinting. In Proceedings of the International Workshop on Digital Water-marking (IWDW). Lecture Notes in Computer Science, vol. 6526. Springer, 224--238."},{"key":"e_1_2_1_20_1","volume-title":"SPIE Security and Watermarking of Multimedia Content III Conference.","volume":"4314","author":"Loo P.","unstructured":"Loo , P. and Kingsbury , N. G . 2001. Motion-Estimation-Based registration of geometrically distorted images for watermark recovery . In SPIE Security and Watermarking of Multimedia Content III Conference. Vol. 4314 . Loo, P. and Kingsbury, N. G. 2001. Motion-Estimation-Based registration of geometrically distorted images for watermark recovery. In SPIE Security and Watermarking of Multimedia Content III Conference. Vol. 4314."},{"doi-asserted-by":"publisher","key":"e_1_2_1_21_1","DOI":"10.1109\/TIP.2003.821551"},{"doi-asserted-by":"publisher","key":"e_1_2_1_22_1","DOI":"10.1109\/MSP.2004.1276103"},{"doi-asserted-by":"publisher","key":"e_1_2_1_23_1","DOI":"10.1145\/1027527.1027712"},{"doi-asserted-by":"publisher","key":"e_1_2_1_24_1","DOI":"10.1109\/18.915661"},{"unstructured":"Stone H. 1996. Analysis of attacks on image watermarks with randomized coefficients. Tech. rep. 96-045 NEC.  Stone H. 1996. Analysis of attacks on image watermarks with randomized coefficients. Tech. rep. 96-045 NEC.","key":"e_1_2_1_25_1"},{"volume-title":"European Signal Processing Conference (EUSIPCO '00)","author":"Su J. K.","unstructured":"Su , J. K. , Eggers , J. J. , and Girod , B . 2000. Capacity of digital watermarks subjected to an optimal collusion attack . In European Signal Processing Conference (EUSIPCO '00) . Su, J. K., Eggers, J. J., and Girod, B. 2000. Capacity of digital watermarks subjected to an optimal collusion attack. In European Signal Processing Conference (EUSIPCO '00).","key":"e_1_2_1_26_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_27_1","DOI":"10.1109\/TSP.2003.809378"},{"doi-asserted-by":"publisher","key":"e_1_2_1_28_1","DOI":"10.1023\/B:DESI.0000012440.32810.23"},{"doi-asserted-by":"publisher","key":"e_1_2_1_29_1","DOI":"10.1007\/s10623-005-6402-5"},{"volume-title":"Electronic Engineering Department","author":"The","unstructured":"The USC-SIPI image database 2009. Electronic Engineering Department , University of Southern California , http:\/\/sipi.usc. edu\/database\/index.html. The USC-SIPI image database 2009. Electronic Engineering Department, University of Southern California, http:\/\/sipi.usc. edu\/database\/index.html.","key":"e_1_2_1_30_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_31_1","DOI":"10.1155\/S1110865704312151"},{"key":"e_1_2_1_32_1","volume-title":"Proceeding of the International Conference on Multimedia and Expo (ICME'03)","volume":"1","author":"Wang Z. J.","unstructured":"Wang , Z. J. , Wu , M. , Zhao , H. , Liu , K. J. R. , and Trappe , W . 2003. Resistance of orthogonal gaussian fingerprints to collusion attacks . In Proceeding of the International Conference on Multimedia and Expo (ICME'03) . Vol. 1 . 724--727. Wang, Z. J., Wu, M., Zhao, H., Liu, K. J. R., and Trappe, W. 2003. Resistance of orthogonal gaussian fingerprints to collusion attacks. In Proceeding of the International Conference on Multimedia and Expo (ICME'03). Vol. 1. 724--727."},{"doi-asserted-by":"publisher","key":"e_1_2_1_33_1","DOI":"10.1109\/TIP.2005.847284"},{"doi-asserted-by":"publisher","key":"e_1_2_1_34_1","DOI":"10.1109\/TIP.2010.2045030"},{"doi-asserted-by":"publisher","key":"e_1_2_1_35_1","DOI":"10.1109\/TIP.2005.846035"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2344436.2344442","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2344436.2344442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:34Z","timestamp":1750239274000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2344436.2344442"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":35,"journal-issue":{"issue":"2S","published-print":{"date-parts":[[2012,9]]}},"alternative-id":["10.1145\/2344436.2344442"],"URL":"https:\/\/doi.org\/10.1145\/2344436.2344442","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2012,9]]},"assertion":[{"value":"2010-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-09-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}