Digital fingerprinting codes: problem statements, constructions, identification of traitors

  • Authors:
  • A. Barg;G. R. Blakley;G. A. Kabatiansky

  • Affiliations:
  • Lucent Technol. Bell Labs., Murray Hill, NJ, USA;-;-

  • Venue:
  • IEEE Transactions on Information Theory
  • Year:
  • 2006

Quantified Score

Hi-index 754.90

Visualization

Abstract

We consider a general fingerprinting problem of digital data under which coalitions of users can alter or erase some bits in their copies in order to create an illegal copy. Each user is assigned a fingerprint which is a word in a fingerprinting code of size M (the total number of users) and length n. We present binary fingerprinting codes secure against size-t coalitions which enable the distributor (decoder) to recover at least one of the users from the coalition with probability of error exp(-Ω(n)) for M=exp(Ω(n)). This is an improvement over the best known schemes that provide the error probability no better than exp(-Ω(n12/)) and for this probability support at most exp(O(n12/)) users. The construction complexity of codes is polynomial in n. We also present versions of these constructions that afford identification algorithms of complexity poly(n)=polylog(M), improving over the best previously known complexity of Ω(M). For the case t=2, we construct codes of exponential size with even stronger performance, namely, for which the distributor can either recover both users from the coalition with probability 1-exp(Ω(n)), or identify one traitor with probability 1.