Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
On codes with the identifiable parent property
Journal of Combinatorial Theory Series A
Multiuser Detection
Improved Boneh-Shaw Content Fingerprinting
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Optimal probabilistic fingerprint codes
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
OFDM and MC-CDMA for Broadband Multi-User Communications, WLANs and Broadcasting
OFDM and MC-CDMA for Broadband Multi-User Communications, WLANs and Broadcasting
Fundamentals of wireless communication
Fundamentals of wireless communication
Design of Collusion-Free Codes Based on MAI-Free Principle
IIH-MSP '06 Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia
Design of Multiuser Collusion-Free Hiding Codes with Delayed Embedding
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 01
Audio watermarking through deterministic plus stochastic signal decomposition
EURASIP Journal on Information Security
Robust MC-CDMA-based fingerprinting against time-varying collusion attacks
IEEE Transactions on Information Forensics and Security
Spread-spectrum watermarking of audio signals
IEEE Transactions on Signal Processing
Anti-collusion fingerprinting for multimedia
IEEE Transactions on Signal Processing
MAI-Free MC-CDMA Systems Based on Hadamard–Walsh Codes
IEEE Transactions on Signal Processing
Linear multichannel blind equalizers of nonlinear FIR Volterrachannels
IEEE Transactions on Signal Processing
Joint coding and embedding techniques for MultimediaFingerprinting
IEEE Transactions on Information Forensics and Security
Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization
IEEE Transactions on Information Forensics and Security
Collusion-secure fingerprinting for digital data
IEEE Transactions on Information Theory
Linear multiuser receivers: effective interference, effective bandwidth and user capacity
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Combinatorial properties of frameproof and traceability codes
IEEE Transactions on Information Theory
Rayleigh fading channels in mobile digital communication systems .I. Characterization
IEEE Communications Magazine
Rayleigh fading channels in mobile digital communication systems .II. Mitigation
IEEE Communications Magazine
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
Visibility of wavelet quantization noise
IEEE Transactions on Image Processing
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
IEEE Transactions on Image Processing
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
IEEE Transactions on Image Processing
Hi-index | 0.00 |
This paper provides a review of previous work and recent results on the design and analysis of collusion-resistant fingerprinting systems. Collusion attacks examined in previous work are with constant weights for all colluders. Collusion attacks on continuous media (such as audio and video) with time-varying weights are simple to implement, but have never been treated by other researchers. In recent years, we have proposed a new fingerprinting system called MC-CDMA-based fingerprinting since it is inspired by the multi-carrier code division multiaccess (MC-CDMA) communication technique. The time-varying collusion attack can be conveniently analyzed by drawing an analogy to the multi-access interference (MAI) problem in a wireless communication system with a time-varying channel response. As a result, many powerful tools from wireless communications can be borrowed to design a collusion-resistant fingerprinting system. They include codeword design, shifted spreading, pilot-based channel estimation, receiver design, etc. Furthermore, we present results on capacity, throughput, and distortion of a colluded media file. Finally, we will mention some open research problems.