Multimedia IPP Codes with Efficient Tracing
نویسندگان
چکیده
Binary multimedia identifiable parent property codes (binary t-MIPPCs) are used in multimedia fingerprinting schemes where the identification of users taking part in the averaging collusion attack to illegally redistribute content is required. In this paper, we first introduce a binary strong multimedia identifiable parent property code (binary t-SMIPPC) whose tracing algorithm is more efficient than that of a binary t-MIPPC. Then a composition construction for binary t-SMIPPCs from qary t-SMIPPCs is provided. Several infinite series of optimal q-ary t-SMIPPCs of length 2 with t = 2, 3 are derived from the relationships among t-SMIPPCs and other fingerprinting codes, such as t-separable codes and t-MIPPCs. Finally, combinatorial properties of q-ary 2-SMIPPCs of length 3 are investigated, and optimal q-ary 2-SMIPPCs of length 3 with q ≡ 0, 1, 2, 5 (mod 6) are constructed.
منابع مشابه
Codes with the identifiable parent property for multimedia fingerprinting
Let C be a q-ary code of length n and size M , and C(i) = {c(i) | c = (c(1), c(2), . . . , c(n)) ∈ C} be the set of ith coordinates of C. The descendant code of a sub-code C ′ ⊆ C is defined to be C ′ (1) × C ′ (2) × · · · × C ′ (n). In this paper, we introduce a multimedia analogue of codes with the identifiable parent property (IPP), called multimedia IPP codes or t-MIPPC(n,M, q), so that giv...
متن کاملPerformance Study on Multimedia Fingerprinting Employing Traceability Codes
Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by uniquely marking copies of the content distributed to each user. Collusion attack is a powerful attack whereby several differently-fingerprinted copies of the same content are combined together to attenuate or even remove the fingerprint. Coded fingerprinting is one major category of fingerprinting tec...
متن کاملNew Constructions for IPP Codes
Identifiable parent property (IPP) codes are introduced to provide protection against illegal producing of copyrighted digital material. In this paper we consider explicit construction methods for IPP codes by means of recursion techniques. The first method directly constructs IPP codes, whereas the second constructs perfect hash families that are then used to derive IPP codes. In fact, the fir...
متن کاملEfficient Traitor Tracing Algorithms Using List Decoding
We apply powerful, recently discovered techniques for the list decoding of error-correcting codes to the problem of efficiently tracing traitors. Much work has focused on methods for constructing such traceability schemes, but the complexity of the traitor tracing algorithms has received little attention. A widely used traitor tracing algorithm, the TA algorithm, has a runtime of O(N) in genera...
متن کاملApplications of list decoding to tracing traitors
We apply results from algebraic coding theory to solve problems in cryptography, by using recent results on list decoding of error-correcting codes to efficiently find traitors who collude to create pirates. We produce schemes for which the TA (traceability) traitor tracing algorithm is very fast. We compare the TA and IPP (identifiable parent property) traitor tracing algorithms, and give evid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1411.6841 شماره
صفحات -
تاریخ انتشار 2014