Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A secure code for recipient watermarking against conspiracy attacks by all users
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A Secure, Robust Watermark for Multimedia
Proceedings of the First International Workshop on Information Hiding
Tamper Resistant Software: An Implementation
Proceedings of the First International Workshop on Information Hiding
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Hi-index | 0.00 |
Fingerprinting is a process that embeds identifiers of the buyers of data into the data. It enables buyers who copied and redistributed data illegally to be identified from the redistributed data. An essential requirement for fingerprinting is the prevention of false accusations, i.e., honest buyers not be accused even when fraud has been committed by merchants and third parties. Previous fingerprinting methods either could not meet this requirement or met it at a high cost, such as that associated with the use of independent servers for fingerprinting. This paper proposes to embed buyers' digital signatures into data and to identify illegal buyers by verifying signatures in the redistributed data. The security of the signature verification is discussed assuming that the redistributed data have been modified by the illegal buyers. The paper shows that the proposed method can prevent false accusations at an acceptable cost.