Private and Blind Digital Fingerprinting Schemes Based upon Complete Complementary Codes

被引:0
|
作者
Kojima, Tetsuya [1 ]
Ohtani, Naoki [2 ]
机构
[1] Tokyo Natl Coll Technol, Dept Comp Sci, Hachioji, Tokyo 1930997, Japan
[2] NHK Media Technol Inc, Tokyo 1500047, Japan
基金
日本学术振兴会;
关键词
WATERMARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Complete complementary code is a family of the spread spectrum sequences with good correlation properties. In this study, the properties of the private and the blind digital fingerprinting schemes using complete complementary codes were evaluated. It is revealed that the proposed scheme is sufficiently robust against collusion attacks by employing a large embedding coefficient in the private case. In addition, in the blind case where the source image cannot be referred to, it was shown that the robustness against collusion attacks could be improved by applying a method called QIM (quantization index modulation) and employing a set of appropriate parameters.
引用
收藏
页码:806 / 810
页数:5
相关论文
共 34 条
  • [11] Improved collusion-secure codes for digital fingerprinting based on finite geometries
    Yagi, Hideki
    Matsushima, Toshiyasu
    Hirasawa, Shigeichi
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 522 - +
  • [12] On the security of digital signature schemes based on error-correcting codes
    Xu, SB
    Doumen, J
    van Tilborg, H
    DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (02) : 187 - 199
  • [13] On the Security of Digital Signature Schemes Based on Error-Correcting Codes
    Sheng-bo Xu
    Jeroen Doumen
    Henk van Tilborg
    Designs, Codes and Cryptography, 2003, 28 : 187 - 199
  • [14] Code acquisition of ZCZ-CDMA systems based on complete complementary codes
    Guo, XX
    Chen, J
    Suehiro, N
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2003, 3 (05): : 585 - 595
  • [15] On the Parameters for CT-CDMA Communication Systems Based on Complete Complementary Codes
    Kojima, Tetsuya
    Aono, Masahiro
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 893 - 898
  • [16] Multiple access method based on complete complementary codes in ultra wideband wireless communication
    Zhao, Li-Xin
    Zhao, Cheng-Lin
    Zhou, Zheng
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2005, 28 (06): : 65 - 68
  • [17] On the Host Signal Approximation for Image Data Hiding Scheme Based on Complete Complementary Codes
    Kojima, Tetsuya
    Kato, Kakeru
    2017 EIGHTH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS (IWSDA), 2017, : 135 - 139
  • [18] A Disaster Prevention Broadcasting Based on Data Hiding Scheme Using Complete Complementary Codes
    Kojima, Tetsuya
    Tachikawa, Toru
    Oizumi, Akihiro
    Yamaguchi, Yoshimasa
    Parampalli, Udaya
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 45 - 49
  • [19] Complete Complementary Code-Based Digital Watermarking with Embedding Region Reduction
    Tsou, Yao-Chun
    Li, Ying
    2013 IEEE 17TH INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE), 2013, : 219 - 220
  • [20] Cell search for cell-based OFDM systems using quasi complete complementary codes
    Chen, Chao-Yu
    Min, Ying-Ju
    Lu, Kuei-Ying
    Chao, Chi-chao
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 4840 - 4844