Watermarking maps: hiding information in structured data
SODA '00 Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Multimedia content screening using a dual watermarking and fingerprinting system
Proceedings of the tenth ACM international conference on Multimedia
Short 3-Secure Fingerprinting Codes for Copyright Protection
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Anonymous Traceability Schemes with Unconditional Security
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
A 2-Secure Code with Efficient Tracing Algorithm
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Reed Solomon Codes for Digital Fingerprinting
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Efficient Watermark Detection and Collusion Security
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Security of Public Watermarking Schemes for Binary Sequences
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Audio Watermark Robustness to Desynchronization via Beat Detection
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Collusion Secure q-ary Fingerprinting for Perceptual Content
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Optimal probabilistic fingerprint codes
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
Constructing a virtual primary key for fingerprinting relational data
Proceedings of the 3rd ACM workshop on Digital rights management
Generalized hashing and parent-identifying codes
Journal of Combinatorial Theory Series A
Fingerprinting and forensic analysis of multimedia
Proceedings of the 12th annual ACM international conference on Multimedia
Traitor tracing for prerecorded and recordable media
Proceedings of the 4th ACM workshop on Digital rights management
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
Building efficient and effective multimedia fingerprints via joint coding and embedding
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Watermill: an optimized fingerprinting system for highly constrained data
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Nonlinear collusion attacks on independent fingerprints for multimedia
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 2
Resistance of orthogonal Gaussian fingerprints to collusion attacks
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 2
Data collection with self-enforcing privacy
Proceedings of the 13th ACM conference on Computer and communications security
Group-oriented fingerprinting for multimedia forensics
EURASIP Journal on Applied Signal Processing
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
Designs, Codes and Cryptography
Anonymous fingerprinting with robust QIM watermarking techniques
EURASIP Journal on Information Security
Optimal probabilistic fingerprint codes
Journal of the ACM (JACM)
On-off keying modulation and tardos fingerprinting
Proceedings of the 10th ACM workshop on Multimedia and security
On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes
Information Hiding
Iterative Detection Method for CDMA-Based Fingerprinting Scheme
Information Hiding
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Improving the Boneh-Franklin Traitor Tracing Scheme
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
An improvement of discrete Tardos fingerprinting codes
Designs, Codes and Cryptography
Tracing and Revoking Pirate Rebroadcasts
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Bounds on the Number of Users for Random 2-Secure Codes
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
Equal-Weight Fingerprinting Codes
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
Performance study and improvement on ECC-based binary anti-collusion forensic code for multimedia
Proceedings of the 11th ACM workshop on Multimedia and security
EM decoding of tardos traitor tracing codes
Proceedings of the 11th ACM workshop on Multimedia and security
Temporal feature modulation for video watermarking
IEEE Transactions on Circuits and Systems for Video Technology
Fingerprinting with minimum distance decoding
IEEE Transactions on Information Forensics and Security
Robust MC-CDMA-based fingerprinting against time-varying collusion attacks
IEEE Transactions on Information Forensics and Security
Fingerprinting compressed multimedia signals
IEEE Transactions on Information Forensics and Security
A study of traceability of CDMA-based fingerprinting scheme
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Improving a Digital Rights Management Scheme for Video Broadcast
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Saddle-point solution of the fingerprinting capacity game under the marking assumption
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Two-level fingerprinting codes
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
DWT-based image fingerprinting scheme resistant against geometrical distortion and lossy compression
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
High-rate random-like spherical fingerprinting codes with linear decoding complexity
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
IH'06 Proceedings of the 8th international conference on Information hiding
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
Informed embedding for multi-bit watermarks
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
A multistage VQ based watermarking technique with fake watermarks
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
An estimation attack on content-based video fingerprinting
Transactions on data hiding and multimedia security II
Forgery attack to an asymptotically optimal traitor tracing scheme
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Identifying dependency between secure messages for protocol analysis
KSEM'07 Proceedings of the 2nd international conference on Knowledge science, engineering and management
Fingerprinting codes for live pay-television broadcast via internet
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
Pirate evolution: how to make the most of your traitor keys
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Collusion-resistant fingerprinting scheme based on the CDMA-technique
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
An improvement of Tardos's collusion-secure fingerprinting codes with very short lengths
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Optimization of Tardos's fingerprinting codes in a viewpoint of memory amount
IH'07 Proceedings of the 9th international conference on Information hiding
Combining Tardos fingerprinting codes and fingercasting
IH'07 Proceedings of the 9th international conference on Information hiding
Network-based traitor-tracing technique using traffic pattern
IEEE Transactions on Information Forensics and Security
A wavelet-PCA-based fingerprinting scheme for peer-to-peer video file sharing
IEEE Transactions on Information Forensics and Security
Robust fingerprinting codes: a near optimal construction
Proceedings of the tenth annual ACM workshop on Digital rights management
A family of asymptotically good binary fingerprinting codes
IEEE Transactions on Information Theory
Collusion-resistant fingerprinting systems: review and recent results
Transactions on data hiding and multimedia security V
On the security of pseudorandomized information-theoretically secure schemes
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
Improving the round complexity of traitor tracing schemes
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Experimental assessment of probabilistic fingerprinting codes over AWGN channel
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Short collusion-secure fingerprint codes against three pirates
IH'10 Proceedings of the 12th international conference on Information hiding
Tardos's fingerprinting code over AWGN channel
IH'10 Proceedings of the 12th international conference on Information hiding
Interleaving embedding scheme for ECC-based multimedia fingerprinting
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
A novel collusion attack strategy for digital fingerprinting
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
Designs, Codes and Cryptography
Digital fingerprinting under and (somewhat) beyond the marking assumption
ICITS'11 Proceedings of the 5th international conference on Information theoretic security
On the effects of pirate evolution on the design of digital content distribution systems
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
Watermarking for adaptive streaming protocols
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Asymptotically false-positive-maximizing attack on non-binary tardos codes
IH'11 Proceedings of the 13th international conference on Information hiding
An asymmetric fingerprinting scheme based on tardos codes
IH'11 Proceedings of the 13th international conference on Information hiding
Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes
Proceedings of the 11th annual ACM workshop on Digital rights management
Attacking traitor tracing schemes using history recording and abrupt decoders
ISC'11 Proceedings of the 14th international conference on Information security
Obtaining asymptotic fingerprint codes through a new analysis of the boneh-shaw codes
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
A new fingerprinting codes for multimedia contents
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
Performance study on multimedia fingerprinting employing traceability codes
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Fingerprinting schemes. identifying the guilty sources using side information
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
A short random fingerprinting code against a small number of pirates
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Detecting collusion attacks in security protocols
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Image fingerprinting scheme for print-and-capture model
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
Practical forensic analysis in advanced access content system
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Dynamic fingerprinting over broadcast using revocation scheme
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Practical pay-TV scheme using traitor tracing scheme for multiple channels
WISA'04 Proceedings of the 5th international conference on Information Security Applications
A family of collusion 2-secure codes
IH'05 Proceedings of the 7th international conference on Information Hiding
Best security index for digital fingerprinting
IH'05 Proceedings of the 7th international conference on Information Hiding
Public traceability in traitor tracing schemes
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
A block oriented fingerprinting scheme in relational database
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Worst-case optimal fingerprinting codes for non-threshold collusion
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
A practical solution for distribution rights protection in multicast environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Fully collusion resistant traitor tracing with short ciphertexts and private keys
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
A public-key traitor tracing scheme with an optimal transmission rate
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
A trellis-based bound on (2,1)-separating codes
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Key management for multicast fingerprinting
ICISS'05 Proceedings of the First international conference on Information Systems Security
Accusation probabilities in Tardos codes: beyond the Gaussian approximation
Designs, Codes and Cryptography
Robust track-and-trace video watermarking
Security and Communication Networks
Bandwidth efficient asymmetric fingerprinting scheme
International Journal of Communication Systems
A collusion attack optimization strategy for digital fingerprinting
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) - Special Issue on Multimedia Security
Performance and code length optimization of joint decoding tardos fingerprinting
Proceedings of the on Multimedia and security
A high capacity and strong robust fingerprinting for compressed images
Computers and Electrical Engineering
Traitor tracing with optimal transmission rate
ISC'07 Proceedings of the 10th international conference on Information Security
Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization
Journal of Systems and Software
Feedback-driven binary code diversification
ACM Transactions on Architecture and Code Optimization (TACO) - Special Issue on High-Performance Embedded Architectures and Compilers
Message-Based traitor tracing with optimal ciphertext rate
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Near-Optimal collusion-secure fingerprinting codes for efficiently tracing illegal re-distribution
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
A simple tracing algorithm for binary fingerprinting code under averaging attack
Proceedings of the first ACM workshop on Information hiding and multimedia security
Leakage detection and tracing for databases
Proceedings of the first ACM workshop on Information hiding and multimedia security
Answering n{2+o(1)} counting queries with differential privacy is hard
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Design of a mobile inspector for detecting illegal Android applications using fingerprinting
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Improved bounds for separating hash families
Designs, Codes and Cryptography
Journal of Computational and Applied Mathematics
Wireless Personal Communications: An International Journal
Hi-index | 754.90 |
This paper discusses methods for assigning code-words for the purpose of fingerprinting digital data, e.g., software, documents, music, and video. Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trace it back to the user. This threat of detection will deter users from releasing unauthorized copies. A problem arises when users collude: for digital data, two different fingerprinted objects can be compared and the differences between them detected. Hence, a set of users can collude to detect the location of the fingerprint. They can then alter the fingerprint to mask their identities. We present a general fingerprinting solution which is secure in the context of collusion. In addition, we discuss methods for distributing fingerprinted data