Recent Fingerprinting Techniques with Cryptographic Protocol
نویسنده
چکیده
According to the development of the Internet, multi-media contents such as music, picture, movie, etc. are treated by digital format on the network. It enables us to purchase digital contents via a net easily. However, it causes several problems such as violation of ownership and illegal distribution of the copy. Digital fingerprinting is used to trace back the illegal users, where unique ID known as digital fingerprints is embedded into digital contents before distribution Wu et al. (2004). When a suspicious copy is found, the owner can identify illegal users by extracting the fingerprint. The fingerprinting techniques of multimedia contents involve the generation of a fingerprint, the embedding operation, and the realization of traceability from redistributed copies. The research on such fingerprinting techniques is classified into two studies; secure cryptographic protocol and design of collusion resistant fingerprint. In a cryptographic protocol, the goal is to achieve the asymmetric property between a buyer and a seller such that only the former can obtain a uniquely fingerprinted copy because of the threat of dispute. If both of the parties know the fingerprinted copy, the buyer may redistribute a pirated copy but later repudiate it by insisting that it came from the seller. An asymmetric protocol Pfitzmann & Schunter (1996) is executed by exploiting the homomorphic property of the public key cryptosystem that enables a seller to produce the ciphertext of fingerprinted copy by operating an encrypted fingerprint with encrypted contents. Since each user purchases multimedia contents involving his own fingerprint, each copy is slightly different. A coalition of users will therefore combine their different marked copies of a same content for the purpose of removing/changing the original fingerprint. A number of works on designing fingerprints that are resistant against the collusion attack have been proposed. Many of them can be categorized into two approaches. One is to exploit the Spread Spectrum (SS) technique Cox et al. (1997); Wang et al. (2004; 2005); Zhao et al. (2005), and the other approach is to devise an exclusive code, known as collusion-secure code Boneh & Shaw (1998); Staddon et al. (2001); Tardos (2003); Trappe et al. (2003); Yacobi (2001); Zhu et al. (2005), which has traceability of colluders. Although cryptographic protocols provide the asymmetric property, the production of embedding information is based on the design of collusion-resistant fingerprint. In this chapter, we introduce the implementation method of watermarking technique in the encrypted domain during the fingerprinting protocol. As the robustness against attacks, a transformed domain like frequency domain is generally suitable to embed watermark information into an image. In such a case, the components of the transformed domain may be 1
منابع مشابه
A Watermarking Scheme Applicable for Fingerprinting Protocol
Fingerprinting protocol applies a watermarking technique to embed a fingerprinting information in a digital content such as music, image, movie, etc.. The cryptographic protocol is studied by many researchers, but how to apply watermarking techniques is not remarked. In this paper, we study the problem to implement the watermarking techniques in the fingerprinting protocol, and then propose an ...
متن کاملOn the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol
Digital fingerprinting of multimedia contents involves the generation of a fingerprint, the embedding operation, and the realization of traceability from redistributed contents. Considering a buyer's right, the asymmetric property in the transaction between a buyer and a seller must be achieved using a cryptographic protocol. In the conventional schemes, the implementation of a watermarking alg...
متن کاملIs it possible to decide whether a cryptographic protocol is secure or not ?
We consider the so called “cryptographic protocols” whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the protocol itself may have weaknesses which can be exploited by an attacker. We sur...
متن کاملHow to Break COT-Based Fingerprinting Schemes and Design New One
Digital fingerprinting schemes are cryptographic methods deterring buyers from illegally redistributing digital contents. It enables sellers to identify the traitor by providing each buyer with a slight different version. What is important in designing fingerprinting scheme is to make it more practical and efficient. Recently, two oblivious transfer protocolbased schemes to consider practicalit...
متن کاملOn the DCT Based Joint Fingerprint Embedding and Decryption Scheme
Till now, some Joint Fingerprinting and Decryption (JFD) schemes have been reported, while few works have been done to analyze their performances. In this paper, the security of the JFD scheme proposed by Kundur et al. is analyzed and improved. The analyses include the compliance with general compression codecs, the security against cryptographic attacks, the security in perception, the relatio...
متن کامل