Skip to main content
Log in

Strongly separable codes

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Binary \(t\)-frameproof codes (\(t\)-FPCs) are used in multimedia fingerprinting schemes where the identification of authorized users taking part in the averaging collusion attack is required. In this paper, a binary strongly \(\overline{t}\)-separable code (\(\overline{t}\)-SSC) is introduced to improve such a scheme based on a binary \(t\)-FPC. A binary \(\overline{t}\)-SSC has the same traceability as a binary \(t\)-FPC but has more codewords than a binary \(t\)-FPC. A composition construction for binary \(\overline{t}\)-SSCs from \(q\)-ary \(\overline{t}\)-SSCs is described, which stimulates the research on \(q\)-ary \(\overline{t}\)-SSCs with short length. Several infinite series of optimal \(q\)-ary \(\overline{2}\)-SSCs of length \(2\) are derived from the fact that a \(q\)-ary \(\overline{2}\)-SSC of length \(2\) is equivalent to a \(q\)-ary \(\overline{2}\)-separable code of length \(2\). Combinatorial properties of \(q\)-ary \(\overline{2}\)-SSCs of length \(3\) are investigated, and a construction for \(q\)-ary \(\overline{2}\)-SSCs of length \(3\) is provided. These \(\overline{2}\)-SSCs of length \(3\) have more than \(12.5\,\%\) codewords than \(2\)-FPCs of length \(3\) could have.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Alon N., Cohen G., Krivelevich M., Litsyn S.: Generalized hashing and parent-identifying codes. J. Comb. Theory Ser. A 104, 207–215 (2003).

  2. Bazrafshan M., van Trung T.: On optimal bounds for separating hash families. Presented at the Germany Africa Workshop on Information and Communication Technology, Essen, Germany (2008).

  3. Blackburn S.R.: Frameproof codes. SIAM J. Discret. Math. 16, 499–510 (2003).

  4. Boneh D., Shaw J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44, 1897–1905 (1998).

  5. Cheng M., Miao Y.: On anti-collusion codes and detection algorithms for multimedia fingerprinting. IEEE Trans. Inf. Theory 57, 4843–4851 (2011).

  6. Cheng M., Ji L., Miao Y.: Separable codes. IEEE Trans. Inf. Theory 58, 1791–1803 (2012).

  7. Cheng M., Fu H.-L., Jiang J., Lo Y.-H., Miao Y.: New bounds on \(\overline{2}\)-separable codes of length 2. Des. Codes Cryptogr. 74, 31–40 (2015).

  8. Cox I.J., Kilian J., Leighton F.T., Shamoon T.G.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673–1687 (1997).

  9. Gao F., Ge G.: New bounds on separable codes for multimedia fingerprinting. IEEE Trans. Inf. Theory 60, 5257–5262 (2014).

  10. Liu K.J.R., Trappe W., Wang Z.J., Wu M., Zhao H.: Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation, New York (2005).

  11. MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977).

  12. Podilchuk C.I., Zeng W.: Image-adaptive watermarking using visual models. IEEE J. Sel. Areas Commun. 16, 525–539 (1998).

  13. Stinson D.R., van Trung T., Wei R.: Secure frameproof codes, key distribution pattern, group testing algorithms and related structures. J. Stat. Plan. Infer. 86, 595–617 (2000).

  14. Trappe W., Wu M., Wang Z.J., Liu K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Sig. Process. 51, 1069–1087 (2003).

Download references

Acknowledgments

The authors express their sincere thanks to the two anonymous reviewers for their valuable comments and suggestions in revising this paper, and to the editor for his/her excellent editorial job. Cheng is supported in part by NSFC (No. 11301098), Guangxi Natural Science Foundations (No. 2013 GXNSFCA019001), and 2014GXNSFDA118001 and Program on the High Level Innovation Team and Outstanding Scholars in Universities of Guangxi Province. Miao is supported by JSPS Grant-in-Aid for Scientific Research (C) under Grant No. 24540111.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Jiang.

Additional information

Communicated by L. Perret.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jiang, J., Cheng, M. & Miao, Y. Strongly separable codes. Des. Codes Cryptogr. 79, 303–318 (2016). https://doi.org/10.1007/s10623-015-0050-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-015-0050-1

Keywords

Mathematics Subject Classification

Navigation