Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front Comput Sci Chin    2011, Vol. 5 Issue (2) : 163-168    https://doi.org/10.1007/s11704-011-9163-5
RESEARCH ARTICLE
A simple fingerprinting scheme for large user groups
Defa HU1(), Qiaoliang LI2
1. School of Information, Hunan University of Commerce, Changsha 410205, China; 2. College of Mathematics and Computer, Hunan Normal University, Changsha 410081, China
 Download: PDF(152 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Digital fingerprinting is an emerging technology to protect multimedia data from piracy, where each distributed copy is labeled with unique identification information. In coded fingerprinting, each codeword of the anti-collusion code is used to represent a user’s fingerprint. In real-world applications, the number of potential users can be very large and hence, the used anti-collusion code should be easy to construct and have as many codewords as possible. This paper proposes a simple coded fingerprinting scheme, where the anti-collusion code is constructed with an identity matrix. The main advantage of our scheme is its simplicity, as a large number of fingerprints can easily be generated to accommodate a large number of users. To improve collusion resistance, some transformations are performed on the original fingerprint in the embedding phase and the corresponding inverse transformations are performed on the extracted sequence in the detection phase.

Keywords digital fingerprinting      digital copyright protection      identity matrix      collusion resistance     
Corresponding Author(s): HU Defa,Email:hdf666@163.com   
Issue Date: 05 June 2011
 Cite this article:   
Defa HU,Qiaoliang LI. A simple fingerprinting scheme for large user groups[J]. Front Comput Sci Chin, 2011, 5(2): 163-168.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-011-9163-5
https://academic.hep.com.cn/fcs/EN/Y2011/V5/I2/163
Fig.1  Basic model of the proposed fingerprint transformation method
Fig.2  Corresponding -1 elements of
Fig.3  Probability of detecting a 1 when the hypothesis is a 1
Fig.4  Probability of detecting a 1 when the hypothesis is a 0
1 Boneh D, Shaw J. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory , 1998, 44(5): 1897-1905
doi: 10.1109/18.705568
2 Li Q, Wang X, Li Y, Pan Y, Fan P. Construction of anti-collusion codes based on cover-free families. In: Proceedings of 6th International Conference on Information Technology: New Generations . 2009, 362-365
3 Barg A, Blakley G R, Kabatiansky G A. Digital fingerprinting codes: problem statements, constructions, identification of traitors. IEEE Transactions on Information Theory , 2003, 49(4): 852-865
doi: 10.1109/TIT.2003.809570
4 Trappe W, Wu M, Wang Z J, Liu K J R. Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing , 2003, 51(4): 1069-1087
doi: 10.1109/TSP.2003.809378
5 Dittmann J. Combining digital watermarks and collusion secure fingerprints for customer copy monitoring. In: Proceedings of IEE Seminar on Secure Images and Image Authentication . 2000, 128-132
6 Podilchuk C, Zeng W. Image adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications , 1998, 16(4): 525-539
doi: 10.1109/49.668975
7 Wang Z J, Wu M, Zhao H V, Trappe W, Liu K J R. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Transactions on Image Processing , 2005, 14(6): 804-821
doi: 10.1109/TIP.2005.847284 pmid:15971779
8 Cox I J, Kilian J, Leighton F T, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing , 1997, 6(12): 1673-1687
doi: 10.1109/83.650120 pmid:18285237
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed