Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
SIAM Journal on Discrete Mathematics
Lower bounds for collusion-secure fingerprinting
SODA '03 Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms
Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract)
STACS '97 Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Identification of traitors in algebraic-geometric traceability codes
IEEE Transactions on Signal Processing - Part II
Improved decoding of Reed-Solomon and algebraic-geometry codes
IEEE Transactions on Information Theory
New Considerations about the Correct Design of Turbo Fingerprinting Codes
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Hi-index | 0.00 |
Digital Fingerprinting is a technique for the merchant who can embed unique buyer identity marks into digital media copy, and also makes it possible to identify "traitors" who redistribute their illegal copies. At present, the fingerprinting scheme generally have many difficulties and disadvantages for large-size uses problems involve in the code construction with shorter length and effective traitor tracing. To resolve these problems, this paper presents the definition of Fingerprinting Information Code and a practical construction method by composing of convolutional codes and generally fingerprinting codes based on Boneh-Shaw model. Its decoding algorithm is presented by introducing the ideal of 'Optional Code Subset' and improving Viterbi algorithm. The security properties and performance are proved and analyzed by theory and example. As the results, the proposed scheme has shorter information encoding length and achieves optimal traitor searching in larger number of buyers.