Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Digital Watermarking Robust Against JPEG Compression
ISW '99 Proceedings of the Second International Workshop on Information Security
Region-Based Watermarking for Images
ISW '99 Proceedings of the Second International Workshop on Information Security
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling
ISW '00 Proceedings of the Third International Workshop on Information Security
Fingerprinting Concatenated Codes with Efficient Identification
ISC '02 Proceedings of the 5th International Conference on Information Security
An audio watermarking scheme robust against stereo attacks
Proceedings of the 2004 workshop on Multimedia and security
Group-oriented fingerprinting for multimedia forensics
EURASIP Journal on Applied Signal Processing
A robust biometric dual watermarking technique with hand vein patterns for digital images
International Journal of Biometrics
Robust frequency domain audio watermarking: a tuning analysis
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
A new class of codes for fingerprinting schemes
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Transactions on Data Hiding and Multimedia Security I
Hi-index | 0.00 |
This paper describes a robust watermarking algorithm and a collusion-secure fingerprinting scheme based on it. Watermarking robustness is obtained by using the JPEG algorithm to decide mark location and magnitude; the proposed algorithm supports multiple marking. The properties of dual binary Hamming codes are exploited to obtain a fingerprinting scheme secure against collusion of two buyers. The fingerprinting construction proposed here is simpler than previous collusion-secure proposals.