Practical Asymmetric Fingerprinting with a TTP
نویسندگان
چکیده
Fingerprinting schemes allow tracing of illegally redistributed multimedia contents. When using asymmetric fingerprinting, the merchant does not know the marked copy nor the embedded mark, so fraudulent distribution of the content by the merchant –which could lead to framing honest customers– is not possible. A problem with the deployment of classical asymmetric fingerprinting protocols is that they are based on information transfer methods whose implementation is difficult, if not infeasible. In this paper, we propose an architecture to obtain asymmetric fingerprinting through symmetric (and thus implementable) schemes and a trusted third party (TTP).
منابع مشابه
Anonymous Fingerprinting
Fingerprinting schemes deter people from illegally redistributing digital data by enabling the original merchant of the data to identify the original buyer of a redistributed copy. Recently, asymmetric fingerprinting schemes were introduced. Here, only the buyer knows the fingerprinted copy after a sale, and if the merchant finds this copy somewhere, he obtains a proof that it was the copy of t...
متن کاملAn Asymmetric Fingerprinting Scheme Based on Tardos Codes
Tardos codes are currently the state-of-the-art in the design of practical collusion-resistant fingerprinting codes. They rely on a secret vector drawn from a publicly known probability distribution in order to generate each Buyer’s fingerprint. For security purposes, this secret vector must not be revealed to the Buyers. To prevent an untrustworthy Provider forging a copy of a Work with an inn...
متن کاملDNA Fingerprinting Based on Repetitive Sequences of Iranian Indigenous Lactobacilli Species by (GTG)5- REP-PCR
Background and Objective: The use of lactobacilli as probiotics requires the application of accurate and reliable methods for the detection and identification of bacteria at the strain level. Repetitive sequence-based polymerase chain reaction (rep-PCR), a DNA fingerprinting technique, has been successfully used as a powerful molecular typing method to determine taxonomic and phylogenetic relat...
متن کاملCommunication Optimal Tardos-Based Asymmetric Fingerprinting
Asymmetric fingerprinting schemes — introduced by Pfitzmann and Schunter in Eurocrypt 1996 — enable the transmission of a file stored in a server to a set of users so that each user obtains a variation of the file. The security considerations of these schemes are as follows: if any (appropriately bounded) subset of users collude to produce a “pirate” copy of the file, it is always possible for ...
متن کاملOn the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol
Digital fingerprinting of multimedia contents involves the generation of a fingerprint, the embedding operation, and the realization of traceability from redistributed contents. Considering a buyer's right, the asymmetric property in the transaction between a buyer and a seller must be achieved using a cryptographic protocol. In the conventional schemes, the implementation of a watermarking alg...
متن کامل