Error- and collusion-secure fingerprinting for digital data

被引:0
|
作者
Guth, HJ [1 ]
Pfitzmann, B [1 ]
机构
[1] Univ Saarland, D-6600 Saarbrucken, Germany
来源
关键词
fingerprinting; watermarking; collusions; errors; marking assumption; probabilistic method; copyright protection; fault tolerance;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fingerprinting means making copies of the same data identifiable by hiding additional information (a fingerprint) in the data. Embedding the additional data can be done by watermarking techniques, which are mainly a branch of signal processing. Most watermarking methods, however, do not treat colluding adversaries who have obtained more than one copy, compare their copies, see differences and use this information to make a copy without a fingerprint. Therefore, there are cryptographic fingerprinting methods to obtain collusion tolerance on top of a watermarking layer. But the most important fingerprinting method by Boneh and Shaw excludes a priori any errors on the watermarking layer, i.e., it is assumed that no changes to the fingerprint occur except those based on the information from collusion attacks. This is a stronger assumption than what most underlying watermarking schemes offer. This assumption can be justified by making each individual mark fault-tolerant on the watermarking layer, e.g., by replication, but that would imply a significant increase in the data size needed. Instead, here we implement the fault tolerance more efficiently on the cryptographic layer by generalizing Boneh and Shaw's fingerprinting methods. Our remaining assumption on the underlying watermarking is quite reasonable for watermarking methods that would be built according to the best currently known principles.
引用
收藏
页码:134 / 145
页数:12
相关论文
共 50 条
  • [1] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
  • [2] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 452 - 465
  • [3] Cryptographic methods for collusion-secure fingerprinting of digital data
    Biehl, I
    Meyer, B
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2002, 28 (01) : 59 - 75
  • [4] Lower bounds for collusion-secure fingerprinting
    Peikert, C
    Shelat, A
    Smith, A
    [J]. PROCEEDINGS OF THE FOURTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2003, : 472 - 479
  • [5] Improved collusion-secure codes for digital fingerprinting based on finite geometries
    Yagi, Hideki
    Matsushima, Toshiyasu
    Hirasawa, Shigeichi
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 522 - +
  • [6] Attacks on collusion-secure fingerprinting for multicast video protocols
    Baaziz, N
    Sami, Y
    [J]. DFMA '05: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS FOR MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2004, : 210 - 216
  • [7] Collusion-secure fingerprinting and B2-sequences
    Cohen, G
    Litsyn, S
    Zémor, G
    [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 242 - 242
  • [8] Protocols for collusion-secure asymmetric fingerprinting (extended abstract)
    Biehl, I
    Meyer, B
    [J]. STACS 97 - 14TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1997, 1200 : 399 - 412
  • [9] Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes
    Yang, Ching-Nung
    Lu, Bing-Ling
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 25 (01) : 1 - 10
  • [10] A random-error-resilient collusion-secure fingerprinting code, randomized c-secure CRT code
    Watanabe, H
    Kitagawa, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (10) : 2589 - 2595