Collusion-secure fingerprinting for digital data

被引:611
|
作者
Boneh, D [1 ]
Shaw, J
机构
[1] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
[2] Princeton Univ, Dept Comp Sci, Princeton, NJ 08544 USA
关键词
collusion resistance; fingerprinting; marking assumption; watermarking;
D O I
10.1109/18.705568
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data, e.g., software, documents, music, and video. Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trace it back to the user. This threat of detection will deter users from releasing unauthorized copies. A problem arises when users collude: for digital data, two different fingerprinted objects can be compared and the differences between them detected. Hence, a set of users can collude to detect the location of the fingerprint. They can then alter the fingerprint to mask their identities. We present a general fingerprinting solution which is secure in the context of collusion. In addition, we discuss methods for distributing fingerprinted data.
引用
收藏
页码:1897 / 1905
页数:9
相关论文
共 50 条
  • [1] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 452 - 465
  • [2] Cryptographic methods for collusion-secure fingerprinting of digital data
    Biehl, I
    Meyer, B
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2002, 28 (01) : 59 - 75
  • [3] Error- and collusion-secure fingerprinting for digital data
    Guth, HJ
    Pfitzmann, B
    [J]. INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 134 - 145
  • [4] Lower bounds for collusion-secure fingerprinting
    Peikert, C
    Shelat, A
    Smith, A
    [J]. PROCEEDINGS OF THE FOURTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2003, : 472 - 479
  • [5] Improved collusion-secure codes for digital fingerprinting based on finite geometries
    Yagi, Hideki
    Matsushima, Toshiyasu
    Hirasawa, Shigeichi
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 522 - +
  • [6] Attacks on collusion-secure fingerprinting for multicast video protocols
    Baaziz, N
    Sami, Y
    [J]. DFMA '05: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS FOR MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2004, : 210 - 216
  • [7] Collusion-secure fingerprinting and B2-sequences
    Cohen, G
    Litsyn, S
    Zémor, G
    [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 242 - 242
  • [8] Protocols for collusion-secure asymmetric fingerprinting (extended abstract)
    Biehl, I
    Meyer, B
    [J]. STACS 97 - 14TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1997, 1200 : 399 - 412
  • [9] Practical Evaluation of Combined Approach for Collusion-Secure Video Fingerprinting
    Afanasyeva, Alexandra
    Linsky, Evgeny
    Ryzhov, Dmitry
    Ivanov, Denis
    [J]. 2014 XIV INTERNATIONAL SYMPOSIUM ON PROBLEMS OF REDUNDANCY IN INFORMATION AND CONTROL SYSTEMS (REDUNDANCY), 2014, : 6 - 9
  • [10] Signature codes for the A-channel and collusion-secure multimedia fingerprinting codes
    Egorova, Elena
    Fernandez, Marcel
    Kabatiansky, Grigory
    Lee, Moon Ho
    [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 3043 - 3047