Abstract:
In this paper we consider stegosystems of fingerprints and collusion attacs on them. The structure of the system of fingerprints, necessary to oppose such attack, is investigated. We propose a method for identifying counter-fitters through a fake fingerprint. Also, in the set of all collective attacks, we identify the riskiest one, the majorizing attack.