Skip to main content

A Secure and Practical Fingerprinting Protocol for Industry Design Map

  • Conference paper
Information and Business Intelligence (IBI 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 268))

Included in the following conference series:

  • 1429 Accesses

Abstract

Digital fingerprinting is an emerging technology to protect the digital data from illegal redistribution by dishonest customer, where each distributed copy is labeled with unique identification information. Industry design map is one of the most important digital assets for both of the designer and company. However, industry design maps are usually used for unintended purposes by those dishonest customers. Piracy of industry design map becomes increasingly rampant in recent years, since the dishonest customer can easily duplicate, modify and redistribute the received copy. How to effectively protect the costly industry design map from unauthorized using has become increasingly critical, especially considering the ease of manipulating digital industry design map and the open Internet environment. This paper proposed a secure and practical fingerprinting protocol for protecting the copyrighted industry design map. In the proposed scheme, the designer can trace the traitors from a pirated copy by means of the embedded unique fingerprint information, while the customer is immune of being framed due to the asymmetric property.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Feng, Y., Zeng, X.: Bandwidth efficient anti-collusion digital fingerprinting scheme. International Review on Computers and Software 6, 93–399 (2011)

    Google Scholar 

  2. Hu, D., Li, Q.: Asymmetric Fingerprinting Based on 1-out-of-n Oblivious Transfer. IEEE Communications Letters 14, 453–455 (2010)

    Article  Google Scholar 

  3. Hu, D., Li, Q.: Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer. International Journal of Information and Computer Security 4, 152–163 (2010)

    Article  Google Scholar 

  4. Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)

    Google Scholar 

  5. Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)

    Google Scholar 

  6. Brassard, G., Chaum, D., Crepeau, C.: Minimum disclosure proofs of knowledge. J. Comput. Syst. Sci. 37, 156–189 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  7. Lei, C.L., et al.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing 13, 1618–1626 (2004)

    Article  Google Scholar 

  8. Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Transactions on Image Processing 14, 2129–2139 (2005)

    Article  Google Scholar 

  9. Hu, D., Li, Q.: A simple fingerprinting scheme for large user groups. Frontiers of Computer Science in China 5, 163–168 (2011)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, F., Wang, C., Wang, Z. (2012). A Secure and Practical Fingerprinting Protocol for Industry Design Map. In: Qu, X., Yang, Y. (eds) Information and Business Intelligence. IBI 2011. Communications in Computer and Information Science, vol 268. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29087-9_100

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29087-9_100

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29086-2

  • Online ISBN: 978-3-642-29087-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics