Fingerprinting Algorithm Based on the Figure’s Collusion Data Base

نویسندگان

  • HUIFEN HUANG
  • DEFA HU
چکیده

Under the application occasion of using data base as the soft products publication, there should be corresponding safety system, which could abstain the privacy actions from the betray users. A privacy tracing and solution resolution is raised in this thesis based on the digital fingerprinting relationship data base. Data fingerprinting database, which combined by patent watermarking and user’s fingerprint in chaotic binary sequence, is imbedded into the data base under the control of encryption key. Based on the chaotic binary sequence’s randomness, to abstract the fingerprinting and trace the betrayer. The plan has strong conclusion safety, at the same time lower the fingerprinting inspection and betray tracing algorithm complexity. The thesis describes the data base fingerprinting encode, embedment, fingerprinting inspection and abstraction algorithm, analyzes the algorithm’s robustness and betray tracing ability, and has experiment testimony. Keyword: Relationship Data Base, Digital Fingerprinting, Collusion Safety, Betray Tracing

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking

Digital fingerprinting is the technique used for traitor tracing in multimedia content distribution. It embeds unique customer information (e.g., customer ID) into multimedia content and generates different copies for different customers. The unique customer information can be extracted from the illegal copy and used to tell the traitor who re-distributes his copy to other unauthorized customer...

متن کامل

Simple Collusion-Secure Fingerprinting Schemes for Images

This paper describes a robust watermarking algorithm and a collusion-secure fingerprinting scheme based on it. Watermarking robustness is obtained by using the JPEG algorithm to decide mark location and magnitude; the proposed algorithm supports multiple marking. The properties of dual binary Hamming codes are exploited to obtain a fingerprinting scheme secure against collusion of two buyers. T...

متن کامل

Exploring QIM-based anti-collusion fingerprinting for multimedia

Digital fingerprinting is an emerging technology to protect multimedia from unauthorized use by embedding a unique fingerprint signal into each user’s copy. A robust embedding algorithm is an important building block in order to make the fingerprint resilient to various distortions and collusion attacks. Spread spectrum embedding has been widely used for multimedia fingerprinting. In this paper...

متن کامل

Expectation maximization decoding of Tardos probabilistic fingerprinting code

This paper presents our recent works on multimedia fingerprinting, improving both the fingerprinting code and the watermarking scheme. Our first contribution focuses on deriving a better accusation process for the well known Tardos codes. It appears that Tardos orginal decoding is very conservative: its performances are guaranteed whatever the collusion strategy. Indeed, major improvements stem...

متن کامل

Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance

Information age demands omnipresence of data. Large data sets are created, maintained and outsourced to the third party experts for data mining. Knowledge and patterns are extracted by using advanced data mining algorithms that assist the decision makers to ensure quick, correct and effective decisions to be made in this world of competition. The outsourcing of these large data sets faces the p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013