Multimedia IPP Codes with Efficient Tracing

نویسندگان

  • Jing Jiang
  • Minquan Cheng
  • Ying Miao
  • Dianhua Wu
چکیده

Binary multimedia identifiable parent property codes (binary t-MIPPCs) are used in multimedia fingerprinting schemes where the identification of users taking part in the averaging collusion attack to illegally redistribute content is required. In this paper, we first introduce a binary strong multimedia identifiable parent property code (binary t-SMIPPC) whose tracing algorithm is more efficient than that of a binary t-MIPPC. Then a composition construction for binary t-SMIPPCs from qary t-SMIPPCs is provided. Several infinite series of optimal q-ary t-SMIPPCs of length 2 with t = 2, 3 are derived from the relationships among t-SMIPPCs and other fingerprinting codes, such as t-separable codes and t-MIPPCs. Finally, combinatorial properties of q-ary 2-SMIPPCs of length 3 are investigated, and optimal q-ary 2-SMIPPCs of length 3 with q ≡ 0, 1, 2, 5 (mod 6) are constructed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Codes with the identifiable parent property for multimedia fingerprinting

Let C be a q-ary code of length n and size M , and C(i) = {c(i) | c = (c(1), c(2), . . . , c(n)) ∈ C} be the set of ith coordinates of C. The descendant code of a sub-code C ′ ⊆ C is defined to be C ′ (1) × C ′ (2) × · · · × C ′ (n). In this paper, we introduce a multimedia analogue of codes with the identifiable parent property (IPP), called multimedia IPP codes or t-MIPPC(n,M, q), so that giv...

متن کامل

Performance Study on Multimedia Fingerprinting Employing Traceability Codes

Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by uniquely marking copies of the content distributed to each user. Collusion attack is a powerful attack whereby several differently-fingerprinted copies of the same content are combined together to attenuate or even remove the fingerprint. Coded fingerprinting is one major category of fingerprinting tec...

متن کامل

New Constructions for IPP Codes

Identifiable parent property (IPP) codes are introduced to provide protection against illegal producing of copyrighted digital material. In this paper we consider explicit construction methods for IPP codes by means of recursion techniques. The first method directly constructs IPP codes, whereas the second constructs perfect hash families that are then used to derive IPP codes. In fact, the fir...

متن کامل

Efficient Traitor Tracing Algorithms Using List Decoding

We apply powerful, recently discovered techniques for the list decoding of error-correcting codes to the problem of efficiently tracing traitors. Much work has focused on methods for constructing such traceability schemes, but the complexity of the traitor tracing algorithms has received little attention. A widely used traitor tracing algorithm, the TA algorithm, has a runtime of O(N) in genera...

متن کامل

Applications of list decoding to tracing traitors

We apply results from algebraic coding theory to solve problems in cryptography, by using recent results on list decoding of error-correcting codes to efficiently find traitors who collude to create pirates. We produce schemes for which the TA (traceability) traitor tracing algorithm is very fast. We compare the TA and IPP (identifiable parent property) traitor tracing algorithms, and give evid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1411.6841  شماره 

صفحات  -

تاریخ انتشار 2014