Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting

  • Conference paper
Information Security Applications (WISA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4298))

Included in the following conference series:

Abstract

In this paper, we discuss collusion-secure traceability codes for digital fingerprinting which is a technique for copyright protection of digital contents. We first state a generalization of conventional collusion attacks where illicit users of a digital content collude to create an illegal digital content. Then we propose a collusion-secure traceability code which can detect at least one colluder against it. We show the rate and properties of the proposed traceability code.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44, 1897–1905 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  2. Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing traitors. IEEE Trans. Inform. Theory 46, 893–910 (2000)

    Article  MATH  Google Scholar 

  3. He, S., Wu, M.: Improving collusion resistance of error correcting code based multimedia fingerprinting. In: Proc. of 2005 IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP’05), vol. 2, pp. 1029–1032. IEEE, Los Alamitos (2005)

    Google Scholar 

  4. Jevtić, D.B.: Disjoint uniquely decodable codebooks for noiseless synchronized multiple-access adder channels generated by integer sets. IEEE Trans. Inform. Theory 38, 1142–1146 (1992)

    Article  MathSciNet  Google Scholar 

  5. MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)

    MATH  Google Scholar 

  6. Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inform. Theory 47, 1042–1049 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  7. Safavi-Naini, R., Wang, Y.: New results on frame-proof codes and traceability schemes. IEEE Trans. Inform. Theory 47, 3029–3033 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  8. Safavi-Naini, R., Wang, Y.: Sequential Traitor Tracing. IEEE Trans. Inform. Theory 49, 1319–1326 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  9. Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 51, 1069–1087 (2003)

    Article  MathSciNet  Google Scholar 

  10. Wang, Z.J., Wu, M., Zhao, H.V., Trappe, W., Liu, K.J.R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans. Image Process. 14, 804–821 (2005)

    Article  Google Scholar 

  11. Podilchuk, C., Zeng, W.: Image adaptive watermarking using visual models. IEEE J. Select. Areas Commun. 16, 525–540 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jae Kwang Lee Okyeon Yi Moti Yung

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Yagi, H., Matsushima, T., Hirasawa, S. (2007). New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting. In: Lee, J.K., Yi, O., Yung, M. (eds) Information Security Applications. WISA 2006. Lecture Notes in Computer Science, vol 4298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71093-6_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71093-6_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71092-9

  • Online ISBN: 978-3-540-71093-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics