Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Efficient Traitor Tracing Algorithms Using List Decoding
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Identification of traitors in algebraic-geometric traceability codes
IEEE Transactions on Signal Processing - Part II
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Iterative Detection Method for CDMA-Based Fingerprinting Scheme
Information Hiding
A study of traceability of CDMA-based fingerprinting scheme
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Collusion-resistant fingerprinting scheme based on the CDMA-technique
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Impact of rounding error on spread spectrum fingerprinting scheme
IEEE Transactions on Information Forensics and Security
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
Hi-index | 0.00 |
Digital Fingerprinting is a technique for the merchant who can embed unique buyer identity marks into digital media copy and also makes it possible to identify ’traitors’ who redistribute their illegal copies. This paper first discusses the collusion-resistant properties of spread-spectrum sequence against malicious attacks such as collusion combination, collusion average and additive noise. A novel two-layers secure fingerprinting scheme is then presented by concatenating the spread-spectrum code with a convolutional code. Moreover, Viterbi algorithm is improved by using Optional Code Set. The code length, collusion security and performance are proved and analyzed. As the results, the proposed scheme for perceptual media has shorter fingerprinting length and achieves optimal traitor searching.