Characteristics of Some Binary Codes for Fingerprinting

  • Tina Lindkvist
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1975)


A digital fingerprint is a unique pattern embedded in a digital document to be able to identify a specific copy when it is used illegally. We have looked at two specific code structures for fingerprinting purpose. Binary linear codes, often used as error correcting codes, and what we call a binary sorted code.


fingerprinting copyright protection watermarking 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Boneh, D., Franklin, B.: An Efficient Public Key Traitor Tracing Scheme. Proceedings of Crypto’99. (1999) 338–353. Springer-Verlag Berlin Heidelberg.Google Scholar
  2. 2.
    Blakley, G. R., Meadows, C., Purdy G. B.: Fingerprinting Long Forgiving Messages. Proceedings of Crypto `85. (1985) 180–189. Springer-Verlag.Google Scholar
  3. 3.
    Boneh, D., Shaw J.: Collusion Secure Fingerprinting for Digital Data. IEEE Transaction on Information Theory, Vol IT-44. (1998) 1897–1905.CrossRefMathSciNetGoogle Scholar
  4. 4.
    Chor, B., Fiat, A., Naor, M.: Tracing Traitors. Proceedings of Crypto’94. (1994). Springer-Verlag Berlin Heidelberg.Google Scholar
  5. 5.
    Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proceedings of IEEE, Vol. 87 (1999) No 7.Google Scholar
  6. 6.
    Kutter, M., Jordan, F., Bossen, F. Digital Signature of Color Images using Amplitude Modulation. SPIE Proceedings, Vol. 3022. (1997) 518–526.Google Scholar
  7. 7.
    Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. Proceedings of Euorocrypt’96. (1996). Springer-Verlag Berlin Heidelberg.Google Scholar
  8. 8.
    Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. Proceedings of Eurocrypt’97. (1997). Springer-Verlag Berlin Heidelberg.Google Scholar
  9. 9.
    Proakis, J. G.: Digital Communications. McGraw-Hill Inc., New York. (1995).Google Scholar
  10. 10.
    Stinson, D. R.: Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes. SIAM Journal on Discrete Mathematics, Volume 11, Number 1. (1998) 41–53.zbMATHCrossRefMathSciNetGoogle Scholar
  11. 11.
    Wagner, N.: Fingerprinting. Proceedings of the 1983 IEEE Symposium on Security and Privacy. (1983) 18–22.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Tina Lindkvist
    • 1
  1. 1.Department of Electrical EngineeringLinköping UniversitySweden

Personalised recommendations