[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/646139.680783guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Improved Boneh-Shaw Content Fingerprinting

Published: 08 April 2001 Publication History

Abstract

We improve on the Boneh-Shaw Fingerprinting scheme in two ways: (i) We merge a Direct Sequence Spread Spectrum (DSSS) embedding layer with the first Boneh-Shaw layer (the so called " code"), effiectively increasing the protected object size by about four orders of magnitude. As a result we have more than one order of magnitude improvement on the size of collusions that we can overcome. (ii) We replace the "marking assumption" with a more realistic assumption, allowing random jamming on the so called "unseen" bits.

References

[1]
N. Alon, J.H. Spencer, and P. Erdös The Probabilistic Method , Wiley Interscience, ISBN 0-471-53588-5.
[2]
Josh Benaloh, Private Communication.
[3]
D. Boneh, Shaw: Collusion Secure Fingerprinting for Digital Data , by D. Boneh, and J. Shaw. IEEE Transactions on Information Theory, Vol 44, No. 5, pp. 1897- 1905, 1998. Extended abstract in Proceedings of Crypto '95, Lecture Notes in Computer Science, Vol. 963, Springer-Verlag, pp. 452-465, 1995.
[4]
Chor, Fiat, Naor: Traitor Tracing , Crypto'94, Yvo Desmedt Ed., pp.257-270; Springer-Verlag LNCS 839.
[5]
A. Fiat and T. Tassa: Dynamic Traitor Tracing , Proc. Crypto'99, pp. 354-371, Michael Wiener Ed., Springer-Verlag LNCS 1666.
[6]
O. Goldreich: On the Foundations of Modern Cryptography , Proc. Crypto 97. pp. 46-74, Burton S. Kaliski Ed., Springer-Verlag LNCS 1294.
[7]
Funda Ergun, Joe Kilian, and Ravi Kumar: A Note on the Limits of Collusion-Resistant Watermarks , Proc. Eurocrypt'99, Springer Verlag LNCS 1592, 1999, J. Stern Ed.
[8]
Rajeev Motwani and Prabhakar Raghavan: Randomized Algorithms , Cambridge U. press, 1995, ISBN 0 521 47465 5.
[9]
J. Van Leeuwen: Handbook of Theoretical Computer Science, Vol. A, Algorithms and Complexity , MIT Press.

Cited By

View all
  • (2015)SVM-based anti-forensic method for spread-spectrum fingerprintingSecurity and Communication Networks10.1002/sec.5038:16(2624-2634)Online publication date: 10-Nov-2015
  • (2013)A simple tracing algorithm for binary fingerprinting code under averaging attackProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482521(3-12)Online publication date: 17-Jun-2013
  • (2012)A high capacity and strong robust fingerprinting for compressed imagesComputers and Electrical Engineering10.1016/j.compeleceng.2011.10.00638:5(1249-1261)Online publication date: 1-Sep-2012
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CT-RSA 2001: Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
April 2001
471 pages
ISBN:3540418989

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 08 April 2001

Author Tags

  1. anti-piracy
  2. collusion-resistance
  3. fingerprints
  4. intellectual property protection
  5. tracing traitors
  6. watermarks

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2015)SVM-based anti-forensic method for spread-spectrum fingerprintingSecurity and Communication Networks10.1002/sec.5038:16(2624-2634)Online publication date: 10-Nov-2015
  • (2013)A simple tracing algorithm for binary fingerprinting code under averaging attackProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482521(3-12)Online publication date: 17-Jun-2013
  • (2012)A high capacity and strong robust fingerprinting for compressed imagesComputers and Electrical Engineering10.1016/j.compeleceng.2011.10.00638:5(1249-1261)Online publication date: 1-Sep-2012
  • (2010)Collusion-resistant fingerprinting systemsTransactions on data hiding and multimedia security V10.5555/1880404.1880409(34-50)Online publication date: 1-Jan-2010
  • (2009)Fingerprinting compressed multimedia signalsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2009.20258604:3(330-345)Online publication date: 1-Sep-2009
  • (2009)Robust MC-CDMA-based fingerprinting against time-varying collusion attacksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2009.20258494:3(302-317)Online publication date: 1-Sep-2009
  • (2008)Optimal probabilistic fingerprint codesJournal of the ACM10.1145/1346330.134633555:2(1-24)Online publication date: 15-May-2008
  • (2007)An estimation attack on content-based video fingerprintingTransactions on data hiding and multimedia security II10.5555/1768240.1768242(35-47)Online publication date: 1-Jan-2007
  • (2006)Statistically secure anti-collusion code design for median attack robustness for practical fingerprintingProceedings of the 8th international conference on Information hiding10.5555/1759048.1759072(328-342)Online publication date: 10-Jul-2006
  • (2006)Scalable fingerprinting scheme using statistically secure anti-collusion code for large scale contents distributionProceedings of the 2006 international conference on Embedded and Ubiquitous Computing10.1007/11802167_57(560-569)Online publication date: 1-Aug-2006
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media