Short 3-Secure Fingerprinting Codes for Copyright Protection

نویسندگان

  • Francesc Sebé
  • Josep Domingo-Ferrer
چکیده

A construction is presented to obtain 3-secure fingerprinting codes for copyright protection. Resistance against collusions of up to three buyers is achieved with a codeword length dramatically shorter than the one required by the general Boneh-Shaw construction. Thus the proposed fingerprints require much less embedding capacity. Due to their very clandestine nature, collusions tend to involve a small number of buyers, so that there is plenty of use for codes providing cost-effective protection against collusions of size up to 3.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Separating Codes: Constructions and Bounds

Separating codes, initially introduced to test automaton, have revived lately in the study of fingerprinting codes, which are used for copyright protection. Separating codes play their role in making the fingerprinting scheme secure agains coalitions of pirates. We provide here better bounds, constructions and generalizations for these codes.

متن کامل

New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting

In this paper, we discuss collusion-secure traceability codes for digital fingerprinting which is a technique for copyright protection of digital contents. We first state a generalization of conventional collusion attacks where illicit users of a digital content collude to create an illegal digital content. Then we propose a collusion-secure traceability code which can detect at least one collu...

متن کامل

On collusion-secure codes for copyright protection

With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprint. If an illegal copy appears, it can be traced back to one or more guilty pirates, due to this fingerprint. To work against a coalition of several pirates the fingerprinting scheme must be based on a collusion-secure code. We make a new error analysis for t...

متن کامل

Random Codes and Graphs for Secure

Title of dissertation: RANDOM CODES AND GRAPHS FOR SECURE COMMUNICATION Nagaraj Prasanth Anthapadmanabhan Doctor of Philosophy, 2009 Dissertation directed by: Professor Alexander Barg Department of Electrical and Computer Engineering This dissertation considers two groups of problems related to secure communication. The first line of research is devoted to theoretical problems of copyright prot...

متن کامل

MPEG Video Content protection based on Fingerprinting Scheme

The paper presents a system for the secure distribution of a copyrighted video based on fingerprinting scheme. A combined selective watermarking and encryption method that operates in the compressed MPEG domain is introduced. Watermarking resistant to a number of attacks is used for copyright protection. The video quality deteriorates significantly due to encryption, thus restraining unauthoriz...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002