Fingerprinting Algorithm Based on the Figure’s Collusion Data Base
نویسندگان
چکیده
Under the application occasion of using data base as the soft products publication, there should be corresponding safety system, which could abstain the privacy actions from the betray users. A privacy tracing and solution resolution is raised in this thesis based on the digital fingerprinting relationship data base. Data fingerprinting database, which combined by patent watermarking and user’s fingerprint in chaotic binary sequence, is imbedded into the data base under the control of encryption key. Based on the chaotic binary sequence’s randomness, to abstract the fingerprinting and trace the betrayer. The plan has strong conclusion safety, at the same time lower the fingerprinting inspection and betray tracing algorithm complexity. The thesis describes the data base fingerprinting encode, embedment, fingerprinting inspection and abstraction algorithm, analyzes the algorithm’s robustness and betray tracing ability, and has experiment testimony. Keyword: Relationship Data Base, Digital Fingerprinting, Collusion Safety, Betray Tracing
منابع مشابه
On the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking
Digital fingerprinting is the technique used for traitor tracing in multimedia content distribution. It embeds unique customer information (e.g., customer ID) into multimedia content and generates different copies for different customers. The unique customer information can be extracted from the illegal copy and used to tell the traitor who re-distributes his copy to other unauthorized customer...
متن کاملSimple Collusion-Secure Fingerprinting Schemes for Images
This paper describes a robust watermarking algorithm and a collusion-secure fingerprinting scheme based on it. Watermarking robustness is obtained by using the JPEG algorithm to decide mark location and magnitude; the proposed algorithm supports multiple marking. The properties of dual binary Hamming codes are exploited to obtain a fingerprinting scheme secure against collusion of two buyers. T...
متن کاملExploring QIM-based anti-collusion fingerprinting for multimedia
Digital fingerprinting is an emerging technology to protect multimedia from unauthorized use by embedding a unique fingerprint signal into each user’s copy. A robust embedding algorithm is an important building block in order to make the fingerprint resilient to various distortions and collusion attacks. Spread spectrum embedding has been widely used for multimedia fingerprinting. In this paper...
متن کاملExpectation maximization decoding of Tardos probabilistic fingerprinting code
This paper presents our recent works on multimedia fingerprinting, improving both the fingerprinting code and the watermarking scheme. Our first contribution focuses on deriving a better accusation process for the well known Tardos codes. It appears that Tardos orginal decoding is very conservative: its performances are guaranteed whatever the collusion strategy. Indeed, major improvements stem...
متن کاملFingerprinting Numeric Databases with Information Preservation and Collusion Avoidance
Information age demands omnipresence of data. Large data sets are created, maintained and outsourced to the third party experts for data mining. Knowledge and patterns are extracted by using advanced data mining algorithms that assist the decision makers to ensure quick, correct and effective decisions to be made in this world of competition. The outsourcing of these large data sets faces the p...
متن کامل