Software protection and simulation on oblivious RAMs
Journal of the ACM (JACM)
Introduction to Coding Theory
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Digital signets: self-enforcing protection of digital information (preliminary version)
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security
Effective iterative techniques for fingerprinting design IP
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Anonymous authentication with subset queries (extended abstract)
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Fingerprinting intellectual property using constraint-addition
Proceedings of the 37th Annual Design Automation Conference
H204M — watermarking for media: classification, quality evaluation, design improvements
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Frameproof codes against limited coalitions of pirates
Theoretical Computer Science
Using Cryptographic and Watermarking Algorithms
IEEE MultiMedia
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Partially Identifying Codes for Copyright Protection
AAECC-14 Proceedings of the 14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Short 3-Secure Fingerprinting Codes for Copyright Protection
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Improved Boneh-Shaw Content Fingerprinting
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Binary Codes for Collusion-Secure Fingerprinting
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A Combinatorial Approach to Asymmetric Traitor Tracing
COCOON '00 Proceedings of the 6th Annual International Conference on Computing and Combinatorics
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Traitor Tracing with Constant Transmission Rate
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Anonymous Traceability Schemes with Unconditional Security
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
A 2-Secure Code with Efficient Tracing Algorithm
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Anonymous Fingerprinting with Group Signatures
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Anonymous Fingerprinting with Direct Non-repudiation
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient Traitor Tracing Algorithms Using List Decoding
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Secure Fingerprinting Using Public-Key Cryptography (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Efficient Trace and Revoke Schemes
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
How to Break a Semi-anonymous Fingerprinting Scheme
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Zero-Knowledge Watermark Detection and Proof of Ownership
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Collusion Secure q-ary Fingerprinting for Perceptual Content
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
On Crafty Pirates and Foxy Tracers
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Fingerprints for Copyright Software Protection
ISW '99 Proceedings of the Second International Workshop on Information Security
Fingerprinting Concatenated Codes with Efficient Identification
ISC '02 Proceedings of the 5th International Conference on Information Security
Anonymous Fingerprinting Based on Committed Oblivious Transfer
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Customer Identification for MPEG Video Based on Digital Fingerprinting
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Simple Collusion-Secure Fingerprinting Schemes for Images
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Tracing and Proving Ownership of Digital Objects
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Intersecting codes and separating codes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Soft-Decision Tracing in Fingerprinted Multimedia Content
IEEE MultiMedia
On a Bound of Cover-Free Families
Designs, Codes and Cryptography
Security in sensor networks: watermarking techniques
Wireless sensor networks
Key-assignment strategies for CPPM
Proceedings of the 2004 workshop on Multimedia and security
An audio watermarking scheme robust against stereo attacks
Proceedings of the 2004 workshop on Multimedia and security
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
Designs, Codes and Cryptography
Designs, Codes and Cryptography
An attack-localizing watermarking scheme for natural language documents
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Collusion secure convolutional fingerprinting information codes
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Beyond cryptographic conditional access
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing
Content adaptive watermarking for multimedia fingerprinting
Computer Standards & Interfaces
An Efficient Anonymous Fingerprinting Protocol
Computational Intelligence and Security
Efficient Traitor Tracing from Collusion Secure Codes
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Tracing Malicious Proxies in Proxy Re-encryption
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
New Considerations about the Correct Design of Turbo Fingerprinting Codes
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Attack Analysis for He & Wu's Joint Watermarking/Fingerprinting Scheme
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Traitors Collaborating in Public: Pirates 2.0
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Traitor Tracing without A Priori Bound on the Coalition Size
ISC '09 Proceedings of the 12th International Conference on Information Security
Trace and revoke systems with short ciphertexts
Proceedings of the 2nd international conference on Security of information and networks
Regular simplex fingerprints and their optimality properties
IEEE Transactions on Information Forensics and Security
Proceedings of the 9th Symposium on Identity and Trust on the Internet
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A computational model for watermark robustness
IH'06 Proceedings of the 8th international conference on Information hiding
Copyright control and separating systems
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Identity-based traitor tracing
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
An anonymous buyer-seller watermarking protocol with anonymity control
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Fingercasting-joint fingerprinting and decryption of broadcast messages
Transactions on data hiding and multimedia security II
Using informed coding and informed embedding to design robust fingerprinting embedding systems
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
Mediated traceable anonymous encryption
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security
Rational enforcement of digital oblivion
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
Identity-based trace and revoke schemes
ProvSec'11 Proceedings of the 5th international conference on Provable security
Traitor tracing for stateful pirate decoders with constant ciphertext rate
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
An efficient fingerprinting scheme with symmetric and commutative encryption
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Collusion secure convolutional spread spectrum fingerprinting
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Regular simplex fingerprints and their optimality properties
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Fingerprinting schemes. identifying the guilty sources using side information
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Traitor tracing against powerful attacks using combinatorial designs
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Equidistant binary fingerprinting codes existence and identification algorithms
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
IH'04 Proceedings of the 6th international conference on Information Hiding
Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring
IH'04 Proceedings of the 6th international conference on Information Hiding
A traitor tracing scheme based on RSA for fast decryption
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Flaws in generic watermarking protocols based on zero-knowledge proofs
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Robust frequency domain audio watermarking: a tuning analysis
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
A new class of codes for fingerprinting schemes
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
An efficient fingerprinting scheme with secret sharing
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
A practical solution for distribution rights protection in multicast environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trace it back to the user. This threat of detection will deter users from releasing unauthorized copies.A problem arises when users collude: For digital data, two different fingerprinted objects can be compared and the differences between them detected. Hence, a set of users can collude to detect the location of the fingerprint. They can then alter the fingerprint to mask their identities. We present a general fingerprinting solution which is secure in the context of collusion. In addition, we discuss methods for distributing fingerprinted data.