Advertisement

Effective Document Fingerprinting

  • Bettina Fazzinga
  • Sergio Flesca
  • Filippo Furfaro
  • Elio MasciariEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10365)

Abstract

Watermarking digital content is a very common approach leveraged by creators of copyrighted digital data to embed fingerprints into their data. The rationale of such operation is to mark each copy of the data in order to uniquely identify it. These watermarks are embedded in a suitable way to prevent their stripping or modification by users for illegal distribution of the copy. If a copy is illegally distributed by a pirate user (or a set of users referred as coalition) it can be identified by the distributor that can analyze the fingerprint and accuse as traitor the person in charge of that copy. Actions can then be taken against this user, to prevent further illegal distribution. Many approaches have been defined to obtain optimal fingerprinting code based on the well-known Tardos encoding [6]. In this work, we discuss a simple yet powerful decoding scheme that shows effective in many practical case.

References

  1. 1.
    Furon, T., Desoubeaux, M.: Tardos codes for real. In: 2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014, Atlanta, pp. 24–29, 3–5 December 2014. http://dx.doi.org/10.1109/WIFS.2014.7084298
  2. 2.
    Nuida, K.: Short collusion-secure fingerprint codes against three pirates. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 86–102. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-16435-4_8 CrossRefGoogle Scholar
  3. 3.
    Nuida, K., Fujitsu, S., Hagiwara, M., Kitagawa, T., Watanabe, H., Ogawa, K., Imai, H.: An improvement of discrete Tardos fingerprinting codes. Des. Codes Cryptogr. 52(3), 339–362 (2009). http://dx.doi.org/10.1007/s10623-009-9285-z MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Skoric, B., Katzenbeisser, S., Celik, M.U.: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr. 46(2), 137–166 (2008). http://dx.doi.org/10.1007/s10623-007-9142-x MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Skoric, B., Vladimirova, T.U., Celik, M.U., Talstra, J.: Tardos fingerprinting is better than we thought. IEEE Trans. Inf. Theor. 54(8), 3663–3676 (2008). http://dx.doi.org/10.1109/TIT.2008.926307 MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Tardos, G.: Optimal probabilistic fingerprint codes. J. ACM 55(2) (2008). www.scopus.com

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Bettina Fazzinga
    • 1
    • 2
  • Sergio Flesca
    • 1
    • 2
  • Filippo Furfaro
    • 1
    • 2
  • Elio Masciari
    • 1
    • 2
    Email author
  1. 1.DIMESUniversity of CalabriaRendeItaly
  2. 2.ICAR-CNRRendeItaly

Personalised recommendations