Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Towards a theory of software protection and simulation by oblivious RAMs
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Minimum disclosure proofs of knowledge
Journal of Computer and System Sciences - 27th IEEE Conference on Foundations of Computer Science October 27-29, 1986
An Efficient Software Protection Scheme
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
A robust and verifiable cryptographically secure election scheme
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
How to generate and exchange secrets
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
Copyright protection for electronic publishing over computer networks
IEEE Network: The Magazine of Global Internetworking
Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security
A new public key cryptosystem based on higher residues
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Effective iterative techniques for fingerprinting design IP
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Fingerprinting intellectual property using constraint-addition
Proceedings of the 37th Annual Design Automation Conference
Multimedia content protection by cryptography and watermarking in tamper-resistant hardware
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
A Combinatorial Approach to Asymmetric Traitor Tracing
COCOON '00 Proceedings of the 6th Annual International Conference on Computing and Combinatorics
Self Protecting Pirates and Black-Box Traitor Tracing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A New Anonymous Fingerprinting Scheme with High Enciphering Rate
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Anonymous Fingerprinting with Group Signatures
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Anonymous Fingerprinting with Direct Non-repudiation
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Secure Fingerprinting Using Public-Key Cryptography (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
How to Break a Semi-anonymous Fingerprinting Scheme
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Automatic Detection of a Watermarked Document Using a Private Key
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
On Crafty Pirates and Foxy Tracers
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling
ISW '00 Proceedings of the Third International Workshop on Information Security
Characteristics of Some Binary Codes for Fingerprinting
ISW '00 Proceedings of the Third International Workshop on Information Security
Anonymous Fingerprinting Based on Committed Oblivious Transfer
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Simple Collusion-Secure Fingerprinting Schemes for Images
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Overcoming the obstacles of zero-knowledge watermark detection
Proceedings of the 2004 workshop on Multimedia and security
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
From digital audiobook to secure digital multimedia-book
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Data collection with self-enforcing privacy
Proceedings of the 13th ACM conference on Computer and communications security
PlataJanus: an audio annotation watermarking framework
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
EURASIP Journal on Applied Signal Processing
Secure multimedia authoring with dishonest collaborators
EURASIP Journal on Applied Signal Processing
An Efficient Anonymous Fingerprinting Protocol
Computational Intelligence and Security
Data Collection with Self-Enforcing Privacy
ACM Transactions on Information and System Security (TISSEC)
Iterative Detection Method for CDMA-Based Fingerprinting Scheme
Information Hiding
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
An efficient buyer-seller watermarking protocol based on composite signal representation
Proceedings of the 11th ACM workshop on Multimedia and security
Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Classification Framework for Fair Content Tracing Protocols
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
On observable delegation of personal data by watermarking
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An anonymous buyer-seller watermarking protocol with anonymity control
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Tracing illegal users of video: reconsideration of tree-specific and endbuyer-specific methods
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Asymmetric fingerprinting based on 1-out-of-n oblivious transfer
IEEE Communications Letters
Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer
International Journal of Information and Computer Security
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
An asymmetric fingerprinting scheme based on tardos codes
IH'11 Proceedings of the 13th international conference on Information hiding
On the security and practicality of a buyer seller watermarking protocol for DRM
Proceedings of the 4th international conference on Security of information and networks
A new fingerprinting codes for multimedia contents
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
An efficient fingerprinting scheme with symmetric and commutative encryption
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
IH'04 Proceedings of the 6th international conference on Information Hiding
Flaws in generic watermarking protocols based on zero-knowledge proofs
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
A novel framework for multiple creatorship protection of digital movies
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
An efficient fingerprinting scheme with secret sharing
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Video fingerprinting system using wavelet and error correcting code
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Bandwidth efficient asymmetric fingerprinting scheme
International Journal of Communication Systems
An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
Fingerprinting schemes deter people from illegal copying of digital data by enabling the merchant of the data to identify the original buyer of a copy that was redistributed illegally. All known fingerprinting schemes are symmetric in the following sense: Both the buyer and the merchant know the fingerprinted copy. Thus, when the merchant finds this copy somewhere, there is no proof that it was the buyer who put it there, and not the merchant. We introduce asymmetric fingerprinting. where only the buyer knows the fingerprinted copy, and the merchant, upon finding it somewhere, can find out and prove to third parties whose copy it was. We present a detailed definition of this concept and constructions. The first construction is based on a quite general symmetric fingerprinting scheme and general cryptographic primitives; it is provably secure if all these underlying schemes are. We also present more specific and more efficient constructions.