Abstract
Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal copy appears, it can be traced back to the guilty user. By using collusion-secure codes, the fingerprinting system is made secure against cut-and-paste attacks. In this paper we study the interface between the collusion-secure fingerprinting codes and the underlying watermarking scheme, and we construct several codes which are both error-correcting and collusion-secure. Error-correction makes the system robust against successful attacks on the watermarking layer.
Similar content being viewed by others
References
International Intellectual Property Alliance, fact sheet. http://www.iipa.com/aboutiipa.html
Barg A., Blakley G.R. and Kabatiansky G.A. (2003). Digital fingerprinting codes: Problem statements, constructions, identification of traitors. IEEE Trans. Inform. Theory 49(4): 852–865
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Advances in Cryptology—CRYPTO’95, Lecture Notes in Computer Science, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44(5), 1897–1905 (1998). Presented in part at CRYPTO’95
Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Advances in Cryptology—CRYPTO ’94. Lecture Notes in Computer Science, vol. 839, pp. 257–270. Springer Heidelberg (1994)
Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing traitors. IEEE Trans. Inform. Theory 46(3), 893–910 (2000). Presented in part at CRYPTO’94
Cox, J., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Franisco (2002)
Guruswami V. and Sudan M. (1999). Improved decoding of Reed-Solomon and algebraic-geometry codes. IEEE Trans. Inform. Theory 45(6): 1757–1767
Guth, H.J., Pfitzmann, B.: Error- and collusion-secure fingerprinting for digital data. In: Information Hiding ’99, Proceedings. Springer Lecture Notes in Computer Science, vol. 1768, pp.134–145. Springer Heidelberg (2000)
Hagerup T. and Rüb C. (1990). A guided tour of Chernoff bounds. Inform. Proces. Lett. 33: 305–308
He S. and Wu M. (2006). Joint coding and embedding techniques for multimedia fingerprinting. IEEE Trans. Inform. ForensicsSecurity 1: 231–248
Kerchoffs A. (1883). La cryptographie militaire. J. Sci. Militaires IX: 5–38
Koetter R. and Vardy A. (2003). Algebraic soft-decision decoding of Reed-Solomon codes. IEEE Trans. Inform. Theory 49(11): 2809–2825
MacWilliams F.J. and Sloane N.J.A. (1977). The Theory of Error-Correcting Codes. North-Holland, Amsterdam
Muratani, H.: A collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience. In: Moskowitz, I.S., (ed.) Information Hiding 2001. Springer Lecture Notes in Computer Science, vol. 2137, pp. 303–315. Springer Heidelberg (2001)
Muratani, H.: Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring. In: Fridrich, J. (ed.) Information Hiding 2004. Springer Lecture Notes in Computer Science, vol. 3200, pp. 282–292. Springer Heidelberg (2004)
Safavi-Naini, R., Wang, Y.: Traitor tracing for shortened and corrupted fingerprints. In: Digital rights management, Springer Lecture Notes in Computer Science, vol. 2696. Springer Heidelberg (2002)
Schaathun, H.G.: The Boneh–Shaw fingerprinting scheme is better than we thought. Tech. Rep. 256, Dept. of Informatics, University of Bergen (2003). Also available at http://www.ii.uib.no/~georg/sci/inf/coding/public/
Schaathun, H.G.: Binary collusion-secure codes: Comparison and improvements. Tech. Rep. 275, Dept. of Informatics,University of Bergen (2004). Also available at http://www.ii.uib.no/georg/sci/inf/coding/public/
Schaathun, H.G.: The boneh–shaw fingerprinting scheme is better than we thought. IEEE Trans. Inf. Forensics Security (2006)
Schaathun, H.G., Fernandez-Muñoz, M.: Boneh-Shaw fingerprinting and soft decision decoding. In: Information Theory Workshop. Rotorua 183–186 (2005)
Schaathun H.G., Fernandez-Muñoz M. (2006) Soft decision decoding of Boneh–Shaw fingerprinting codes. IEICE Trans. E89-A(10): 2603–2608
Tardos, G.: Optimal probabilistic fingerprint codes (in part at STOC’03). J ACM (2005, to appear). Also available at http://www.renyi.hu/~tardos/fingerprint.ps
Tsfasman, M.A.: Algebraic-geometric codes and asymptotic problems. Discrete Appl. Math. 33(1–3), 241–256 (1991). Applied algebra, algebraic algorithms, and error-correctingcodes (Toulouse, 1989)
Wagner, N.R.: Fingerprinting. In: Proceedings of the 1983 Symposium on Security and Privacy (1983)
Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion resistant fingerprinting for multimedia. IEEE Signal Process. Magaz. (2004)
Yoshioka K. and Matsumoto T. (2003). Random-error resilience of a short collusion-secure code. IEICE Trans. Fundamentals E86A(5): 1147–1155
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Schaathun, H.G. On error-correcting fingerprinting codes for use with watermarking. Multimedia Systems 13, 331–344 (2008). https://doi.org/10.1007/s00530-007-0096-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-007-0096-7