Multimedia Systems

, Volume 13, Issue 5–6, pp 331–344 | Cite as

On error-correcting fingerprinting codes for use with watermarking

Regular Paper

Abstract

Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal copy appears, it can be traced back to the guilty user. By using collusion-secure codes, the fingerprinting system is made secure against cut-and-paste attacks. In this paper we study the interface between the collusion-secure fingerprinting codes and the underlying watermarking scheme, and we construct several codes which are both error-correcting and collusion-secure. Error-correction makes the system robust against successful attacks on the watermarking layer.

Keywords

Collusion-secure fingerprinting Copyright protection Error-correcting codes Watermarking Soft-decision decoding 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    International Intellectual Property Alliance, fact sheet. http://www.iipa.com/aboutiipa.html
  2. 2.
    Barg A., Blakley G.R. and Kabatiansky G.A. (2003). Digital fingerprinting codes: Problem statements, constructions, identification of traitors. IEEE Trans. Inform. Theory 49(4): 852–865 MATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Advances in Cryptology—CRYPTO’95, Lecture Notes in Computer Science, vol. 963, pp. 452–465. Springer, Heidelberg (1995)Google Scholar
  4. 4.
    Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44(5), 1897–1905 (1998). Presented in part at CRYPTO’95Google Scholar
  5. 5.
    Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Advances in Cryptology—CRYPTO ’94. Lecture Notes in Computer Science, vol. 839, pp. 257–270. Springer Heidelberg (1994)Google Scholar
  6. 6.
    Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing traitors. IEEE Trans. Inform. Theory 46(3), 893–910 (2000). Presented in part at CRYPTO’94Google Scholar
  7. 7.
    Cox, J., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Franisco (2002)Google Scholar
  8. 8.
    Guruswami V. and Sudan M. (1999). Improved decoding of Reed-Solomon and algebraic-geometry codes. IEEE Trans. Inform. Theory 45(6): 1757–1767 MATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Guth, H.J., Pfitzmann, B.: Error- and collusion-secure fingerprinting for digital data. In: Information Hiding ’99, Proceedings. Springer Lecture Notes in Computer Science, vol. 1768, pp.134–145. Springer Heidelberg (2000)Google Scholar
  10. 10.
    Hagerup T. and Rüb C. (1990). A guided tour of Chernoff bounds. Inform. Proces. Lett. 33: 305–308 MATHCrossRefGoogle Scholar
  11. 11.
    He S. and Wu M. (2006). Joint coding and embedding techniques for multimedia fingerprinting. IEEE Trans. Inform. ForensicsSecurity 1: 231–248 CrossRefGoogle Scholar
  12. 12.
    Kerchoffs A. (1883). La cryptographie militaire. J. Sci. Militaires IX: 5–38 Google Scholar
  13. 13.
    Koetter R. and Vardy A. (2003). Algebraic soft-decision decoding of Reed-Solomon codes. IEEE Trans. Inform. Theory 49(11): 2809–2825 CrossRefMathSciNetGoogle Scholar
  14. 14.
    MacWilliams F.J. and Sloane N.J.A. (1977). The Theory of Error-Correcting Codes. North-Holland, Amsterdam MATHGoogle Scholar
  15. 15.
    Muratani, H.: A collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience. In: Moskowitz, I.S., (ed.) Information Hiding 2001. Springer Lecture Notes in Computer Science, vol. 2137, pp. 303–315. Springer Heidelberg (2001)Google Scholar
  16. 16.
    Muratani, H.: Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring. In: Fridrich, J. (ed.) Information Hiding 2004. Springer Lecture Notes in Computer Science, vol. 3200, pp. 282–292. Springer Heidelberg (2004)Google Scholar
  17. 17.
    Safavi-Naini, R., Wang, Y.: Traitor tracing for shortened and corrupted fingerprints. In: Digital rights management, Springer Lecture Notes in Computer Science, vol. 2696. Springer Heidelberg (2002)Google Scholar
  18. 18.
    Schaathun, H.G.: The Boneh–Shaw fingerprinting scheme is better than we thought. Tech. Rep. 256, Dept. of Informatics, University of Bergen (2003). Also available at http://www.ii.uib.no/~georg/sci/inf/coding/public/
  19. 19.
    Schaathun, H.G.: Binary collusion-secure codes: Comparison and improvements. Tech. Rep. 275, Dept. of Informatics,University of Bergen (2004). Also available at http://www.ii.uib.no/georg/sci/inf/coding/public/
  20. 20.
    Schaathun, H.G.: The boneh–shaw fingerprinting scheme is better than we thought. IEEE Trans. Inf. Forensics Security (2006)Google Scholar
  21. 21.
    Schaathun, H.G., Fernandez-Muñoz, M.: Boneh-Shaw fingerprinting and soft decision decoding. In: Information Theory Workshop. Rotorua 183–186 (2005)Google Scholar
  22. 22.
    Schaathun H.G., Fernandez-Muñoz M. (2006) Soft decision decoding of Boneh–Shaw fingerprinting codes. IEICE Trans. E89-A(10): 2603–2608Google Scholar
  23. 23.
    Tardos, G.: Optimal probabilistic fingerprint codes (in part at STOC’03). J ACM (2005, to appear). Also available at http://www.renyi.hu/~tardos/fingerprint.ps
  24. 24.
    Tsfasman, M.A.: Algebraic-geometric codes and asymptotic problems. Discrete Appl. Math. 33(1–3), 241–256 (1991). Applied algebra, algebraic algorithms, and error-correctingcodes (Toulouse, 1989)Google Scholar
  25. 25.
    Wagner, N.R.: Fingerprinting. In: Proceedings of the 1983 Symposium on Security and Privacy (1983)Google Scholar
  26. 26.
    Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion resistant fingerprinting for multimedia. IEEE Signal Process. Magaz. (2004)Google Scholar
  27. 27.
    Yoshioka K. and Matsumoto T. (2003). Random-error resilience of a short collusion-secure code. IEICE Trans. Fundamentals E86A(5): 1147–1155 Google Scholar

Copyright information

© Springer-Verlag 2007

Authors and Affiliations

  1. 1.Department of ComputingUniversity of SurreyGuildfordEngland

Personalised recommendations