Group-oriented and Collusion Secure Fingerprint for Digital Images
نویسندگان
چکیده
Digital fingerprinting is a technique for identifying unauthorized copy and tracing back to its user. The distributor marks each individual copy with a unique fingerprint. The present fingerprinting schemes generally have many difficulties and disadvantages in the case of large-size users. In this paper, we present a new fingerprint scheme which can be used in confidential departments where there are a limited number of users. This scheme is composed of an outer RS (Reed-Solomon) code and an inner code based on BIBD (balanced incomplete block design) code and orthogonal code. We first construct inner code matrix based on BIBD block and orthogonal code. Since the BIBD code just has good performance in resisting linear collusion attacks, we expand the inner code to improve inner code’s ability of resisting nonlinear collusion attacks. In reality, the probabilities of participation in collusion in different combinations of users vary. So we group inner codeword into subsets and distribute each subset to a group of users. The code scheme turns into a type of grouporiented fingerprint which is favorable to trace colluders and to avoid involving innocent users. Then we take the inner codeword as the RS code’s symbols and make the outer code satisfy the request of resisting collusion attacks. In the end, by concatenating inner and outer code, we get the final fingerprint. The performance of the algorithms is proved and analyzed by theory. Compared with traditional codes for digital fingerprint, under the same collusion size and error probability, our scheme shortens digital fingerprint length significantly, and test experiments confirm the code’s ability of resisting collusion attacks.
منابع مشابه
On collusion-secure codes for copyright protection
With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprint. If an illegal copy appears, it can be traced back to one or more guilty pirates, due to this fingerprint. To work against a coalition of several pirates the fingerprinting scheme must be based on a collusion-secure code. We make a new error analysis for t...
متن کاملGroup-Oriented Fingerprinting for Multimedia Forensics
Digital fingerprinting of multimedia data involves embedding information in the content signal and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprinting is collusion, whereby a group of adversaries combine their individual copies in an attempt to remove the underlying fi...
متن کاملSimple Collusion-Secure Fingerprinting Schemes for Images
This paper describes a robust watermarking algorithm and a collusion-secure fingerprinting scheme based on it. Watermarking robustness is obtained by using the JPEG algorithm to decide mark location and magnitude; the proposed algorithm supports multiple marking. The properties of dual binary Hamming codes are exploited to obtain a fingerprinting scheme secure against collusion of two buyers. T...
متن کاملScalable Fingerprinting Scheme Using Statistically Secure Anti-collusion Code for Large Scale Contents Distribution
Fingerprinting schemes use digital watermarks to determine originators of unauthorized/pirated copies. Multiple users may collude and collectively escape identification by creating an average or median of their individually watermarked copies. Previous fingerprint code design including ACC (anti-collusion code) cannot support large number of users, which is a common situation in ubiquitous cont...
متن کاملCollusion-Secure Fingerpinting for Digital Data
This is the report based on the paper [BS98]. This report introduces fingerprinting for digital data and problem of collusion, and then presents results obtained in the paper. Some possible ideas for further research are discussed at the end.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCP
دوره 6 شماره
صفحات -
تاریخ انتشار 2011