Skip to main content
Log in

On error-correcting fingerprinting codes for use with watermarking

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal copy appears, it can be traced back to the guilty user. By using collusion-secure codes, the fingerprinting system is made secure against cut-and-paste attacks. In this paper we study the interface between the collusion-secure fingerprinting codes and the underlying watermarking scheme, and we construct several codes which are both error-correcting and collusion-secure. Error-correction makes the system robust against successful attacks on the watermarking layer.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. International Intellectual Property Alliance, fact sheet. http://www.iipa.com/aboutiipa.html

  2. Barg A., Blakley G.R. and Kabatiansky G.A. (2003). Digital fingerprinting codes: Problem statements, constructions, identification of traitors. IEEE Trans. Inform. Theory 49(4): 852–865

    Article  MATH  MathSciNet  Google Scholar 

  3. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Advances in Cryptology—CRYPTO’95, Lecture Notes in Computer Science, vol. 963, pp. 452–465. Springer, Heidelberg (1995)

  4. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44(5), 1897–1905 (1998). Presented in part at CRYPTO’95

    Google Scholar 

  5. Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Advances in Cryptology—CRYPTO ’94. Lecture Notes in Computer Science, vol. 839, pp. 257–270. Springer Heidelberg (1994)

  6. Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing traitors. IEEE Trans. Inform. Theory 46(3), 893–910 (2000). Presented in part at CRYPTO’94

    Google Scholar 

  7. Cox, J., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Franisco (2002)

  8. Guruswami V. and Sudan M. (1999). Improved decoding of Reed-Solomon and algebraic-geometry codes. IEEE Trans. Inform. Theory 45(6): 1757–1767

    Article  MATH  MathSciNet  Google Scholar 

  9. Guth, H.J., Pfitzmann, B.: Error- and collusion-secure fingerprinting for digital data. In: Information Hiding ’99, Proceedings. Springer Lecture Notes in Computer Science, vol. 1768, pp.134–145. Springer Heidelberg (2000)

  10. Hagerup T. and Rüb C. (1990). A guided tour of Chernoff bounds. Inform. Proces. Lett. 33: 305–308

    Article  MATH  Google Scholar 

  11. He S. and Wu M. (2006). Joint coding and embedding techniques for multimedia fingerprinting. IEEE Trans. Inform. ForensicsSecurity 1: 231–248

    Article  Google Scholar 

  12. Kerchoffs A. (1883). La cryptographie militaire. J. Sci. Militaires IX: 5–38

    Google Scholar 

  13. Koetter R. and Vardy A. (2003). Algebraic soft-decision decoding of Reed-Solomon codes. IEEE Trans. Inform. Theory 49(11): 2809–2825

    Article  MathSciNet  Google Scholar 

  14. MacWilliams F.J. and Sloane N.J.A. (1977). The Theory of Error-Correcting Codes. North-Holland, Amsterdam

    MATH  Google Scholar 

  15. Muratani, H.: A collusion-secure fingerprinting code reduced by Chinese remaindering and its random-error resilience. In: Moskowitz, I.S., (ed.) Information Hiding 2001. Springer Lecture Notes in Computer Science, vol. 2137, pp. 303–315. Springer Heidelberg (2001)

  16. Muratani, H.: Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring. In: Fridrich, J. (ed.) Information Hiding 2004. Springer Lecture Notes in Computer Science, vol. 3200, pp. 282–292. Springer Heidelberg (2004)

  17. Safavi-Naini, R., Wang, Y.: Traitor tracing for shortened and corrupted fingerprints. In: Digital rights management, Springer Lecture Notes in Computer Science, vol. 2696. Springer Heidelberg (2002)

  18. Schaathun, H.G.: The Boneh–Shaw fingerprinting scheme is better than we thought. Tech. Rep. 256, Dept. of Informatics, University of Bergen (2003). Also available at http://www.ii.uib.no/~georg/sci/inf/coding/public/

  19. Schaathun, H.G.: Binary collusion-secure codes: Comparison and improvements. Tech. Rep. 275, Dept. of Informatics,University of Bergen (2004). Also available at http://www.ii.uib.no/georg/sci/inf/coding/public/

  20. Schaathun, H.G.: The boneh–shaw fingerprinting scheme is better than we thought. IEEE Trans. Inf. Forensics Security (2006)

  21. Schaathun, H.G., Fernandez-Muñoz, M.: Boneh-Shaw fingerprinting and soft decision decoding. In: Information Theory Workshop. Rotorua 183–186 (2005)

  22. Schaathun H.G., Fernandez-Muñoz M. (2006) Soft decision decoding of Boneh–Shaw fingerprinting codes. IEICE Trans. E89-A(10): 2603–2608

    Google Scholar 

  23. Tardos, G.: Optimal probabilistic fingerprint codes (in part at STOC’03). J ACM (2005, to appear). Also available at http://www.renyi.hu/~tardos/fingerprint.ps

  24. Tsfasman, M.A.: Algebraic-geometric codes and asymptotic problems. Discrete Appl. Math. 33(1–3), 241–256 (1991). Applied algebra, algebraic algorithms, and error-correctingcodes (Toulouse, 1989)

  25. Wagner, N.R.: Fingerprinting. In: Proceedings of the 1983 Symposium on Security and Privacy (1983)

  26. Wu, M., Trappe, W., Wang, Z.J., Liu, K.J.R.: Collusion resistant fingerprinting for multimedia. IEEE Signal Process. Magaz. (2004)

  27. Yoshioka K. and Matsumoto T. (2003). Random-error resilience of a short collusion-secure code. IEICE Trans. Fundamentals E86A(5): 1147–1155

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hans Georg Schaathun.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Schaathun, H.G. On error-correcting fingerprinting codes for use with watermarking. Multimedia Systems 13, 331–344 (2008). https://doi.org/10.1007/s00530-007-0096-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-007-0096-7

Keywords

Navigation