Collusion-secure fingerprinting for digital data
- 1 September 1998
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Theory
- Vol. 44 (5) , 1897-1905
- https://doi.org/10.1109/18.705568
Abstract
This paper discusses methods for assigning code-words for the purpose of fingerprinting digital data, e.g., software, documents, music, and video. Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trace it back to the user. This threat of detection will deter users from releasing unauthorized copies. A problem arises when users collude: for digital data, two different fingerprinted objects can be compared and the differences between them detected. Hence, a set of users can collude to detect the location of the fingerprint. They can then alter the fingerprint to mask their identities. We present a general fingerprinting solution which is secure in the context of collusion. In addition, we discuss methods for distributing fingerprinted data.Keywords
This publication has 11 references indexed in Scilit:
- Electronic marking and identification techniques to discourage document copyingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Embedding secret information into a dithered multi-level imagePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Tracing traitorsIEEE Transactions on Information Theory, 2000
- Collusion-secure fingerprinting for digital dataIEEE Transactions on Information Theory, 1998
- Combinatorial Properties and Constructions of Traceability Schemes and Frameproof CodesSIAM Journal on Discrete Mathematics, 1998
- Protocols for collusion-secure asymmetric fingerprintingPublished by Springer Nature ,1997
- Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphsIEEE Transactions on Information Theory, 1992
- Families of finite sets in which no set is covered by the union ofr othersIsrael Journal of Mathematics, 1985
- Advances in CryptologyPublished by Springer Nature ,1985
- Introduction to Coding TheoryPublished by Springer Nature ,1982