Robust Anonymous Fingerprinting

نویسندگان

  • Jeroen Prins
  • Zekeriya Erkin
  • Reginald Lagendijk
چکیده

Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. An efficient, anonymous fingerprinting scheme has been proposed by Kuribayashi and Tanaka to provide a secure and efficient protocol for both buyer and merchant [2]. However, the underlying watermarking scheme is based on basic quantization index modulation (QIM). Unfortunately, QIM watermarking is relatively fragile to even the simplest attacks, such as additive noise attacks and amplitude scaling. In order for this fingerprinting scheme to provide sufficient guarantees for the merchant, the buyer must be unable to remove the fingerprint without significantly degrading the purchased digital content. In this paper, we use robust watermarking techniques with the anonymous fingerprinting approach proposed by Kuribayashi and Tanaka. In particular, we consider rational dither modulation (RDM). We show that homomorphic properties of the Okamoto-Uchiyama cryptosystem also allow for creating an anonymous fingerprinting scheme based on RDM.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Master ’ s Thesis Robust Anonymous Fingerprinting

Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer’s identity as a watermark into the content, so that the merchant can retrieve the buyer’s identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer’s identity multiple times, it is e...

متن کامل

Anonymous Fingerprinting with Robust QIM Watermarking Techniques

Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer’s identity as a watermark into the content so that the merchant can retrieve the buyer’s identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer’s identity multiple times, it is es...

متن کامل

Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors

As the markets of digital contents over computer networks become more popular, illegal redistribution of contents by a buyer becomes the more serious problem. To deter illegal redistribution, various fingerprinting schemes have been proposed. The fingerprinting schemes enable merchants to embed information which identifies the original buyer to the purchased content. Identifying the original bu...

متن کامل

Coin-Based Anonymous Fingerprinting

Fingerprinting schemes are technical means to discourage people from illegally redistributing the digital data they have legally purchased. These schemes enable the original merchant to identify the original buyer of the digital data. In so-called asymmetric fingerprinting schemes the fingerprinted data item is only known to the buyer after a sale and if the merchant finds an illegally redistri...

متن کامل

Efficient Smart-Card Based Anonymous Fingerprinting

Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as a technique for copyright protection which is compatible with buyer anonymity in electronic transactions. However, the complexity of known algorithms for anonymous fingerprinting is too high for practical implementation on sta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007