References
N. R. Wagner, “Fingerprinting,” Proceedings of IEEE Symposium on Security and Privacy, 1983, pp. 18–22.
D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,” IEEE Transactions on Information Theory, Vol. 44, September 1998, pp. 1897–1905.
A. Barg, G. R. Blakley, and G. A. Kabatiansky, “Digital fingerprinting codes: Problem statements, constructions, identification of traitors,” IEEE Transactions on Information Theory, Vol. 49, April 2003, pp. 852–865.
W. Luh and D. Kundur, “Digital media fingerprinting: techniques and trends,” in Handbook of Multimedia Security, B. Furht and D. Kirovski, Eds. CRC Press, 2004, pp. 567–594.
G. Tardos, “Optimal probabilistic fingerprint codes,” Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003, pp. 116–125.
M. Wu, W. Trappe, Z. J. Wang, and K. J. R. Liu, “Collusion-resistant fingerprinting for multimedia,” IEEE Signal Processing Magazine, March 2004, pp. 15–27.
J. Dittmann, A. Behr, M. Stabenau, P. Schmitt, J. Schwenk, and J. Ueberberg, “Combining digital watermarks and collusion secure fingerprints for digital images,” SPIE Journal of Electronic Imaging, Vol. 9, pp. 456–467, 2000.
R. Safavi-Naini and Y. Wang, “Collusion secure q-ary fingerprinting for perceptual content,” in Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, pp. 57–75.
F. Sebe and J. Domingo-Ferrer, “Scattering codes to implement short 3-secure fingerprinting for copyright protection,” Electronics Letters, Vol. 38, No. 17, 2002, pp. 958–959.
V. D. To, R. Safavi-Naini, and Y. Wang, “A 2-secure code with efficient tracing algorithm,” Proceedings in the Third International Conference on Cryptology, 2002, pp. 149–162.
J. Domingo-Ferrer and J. Herrera-Joancomarti, “Simple collusion-secure fingerprinting schemes for images,” Proceedings of the International Symposium on Information Technology, March 2000, pp. 128–132.
Z. J.Wang, M. Wu, W. Trappe, and K. J. R. Liu, “Group-oriented fingerprinting for multimedia forensics,” EURASIP Journal on Applied Signal Processing, Vol. 14, 2004, pp. 2153–2173.
G. R. Blakley, C. Meadows, and G. B. Purdy, “Fingerprinting long forgiving messages,” in Lecture notes in computer sciences — On Advances in cryptology, 1986, Vol. 218, pp. 180–189.
B. Chor, A. Fiat, M. Naor, and B. Pinkas, “Tracing traitors,” IEEE Transactions on Information Theory, Vol. 46, No. 5, 2000, pp. 893–910.
A. Silverberg, J. Staddon, and J. Walker, “Applications of list decoding to tracing traitors,” IEEE Transactions on Information Theory, Vol. 49, No. 5, 2003, pp. 1312–1318.
M. Fernandez and M. Soriano, “Soft-decision tracing in fingerprinted multimedia content,” IEEE Transactions on Multimedia, Vol. 11, No. 2, 2004, pp. 38–46.
H. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, “Nonlinear collusion attacks on independent fingerprints for multimedia,” Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003, pp. 613–616.
P. Moulin and A. Briassouli, “The Gaussian fingerprinting game,” Proceedings of the Conference on Information Sciences and Systems, Princeton, NJ, March 2002.
J. K. Su, J. J. Eggers, and B. Girod, “Capacity of digital watermarks subjected to an optimal collusion attack,” Proceedings of the European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland, 2000.
A. Somekh-Baruch and N. Merhav, “On the capacity game of private fingerprinting systems under collusion attacks,” IEEE Transactions on Information Theory, Vol. 51, No. 3, March 2005, pp. 884–889.
M. U. Celik, G. Sharma, and A. M. Tekalp, “Collusion-resilient fingerprinting using random pre-warping,” IEEE Signal Processing Letters, Vol. 11, pp. 831–835, October 2004.
W. Luh and D. Kundur, “New paradigms for effective multicasting and fingerprinting of entertainment media,” IEEE Communications Magazine, June 2005, accepted.
R. Parviainen and P. Parnes, “Large scale distributed watermarking of multicast media through encryption,” in Proc. of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues of the New Century, 2001, Vol. 64, pp. 149–158.
H. Zhao and K. J. R. Liu, “Bandwidth efficient fingerprint multicast for video streaming,” Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, May 2004.
D. Kirovski, H. S. Malvar, and Y. Yacobi, “Multimedia content screening using a dual watermarking and fingerprinting system,” IEEE Multimedia Magazine, Vol. 11, No. 3, pp. 59–73, 2004.
I. Brown, C. Perkins, and J. Crowcroft, “Watercasting: Distributed watermarking of multicast media,” in Network Group Communications, November 1999, pp. 286–300.
P. Q. Judge and M. H. Ammar, “Whim: Watermarking multicast video with a hierarchy of intermediaries,” Proceedings of the NOSSDAC, June 2000, pp. 699–712.
R. Anderson and C. Manifavas, “Chameleon — a new kind of stream cipher,” in Fast Software Encryption, Haifa, Israel, January 1997, pp. 107–113.
D. Kundur and K. Karthik, “Digital fingerprinting and encryption principles for digital rights management,” Proceedings of the IEEE Special Issue on Enabling Security Technologies for Digital Rights Management, Vol. 92, No. 6, June 2004, pp. 918–932.
B. Pfitzmann and M. Schunter, “Asymmetric fingerprinting,” Lecture Notes in Computer Science, Vol. 1070, 1996, pp. 84–95.
B. Pfitzmann and M. Waidner, “Anonymous fingerprinting,” Lecture Notes in Computer Science, Vol. 1233, 1997, pp. 88–102.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, Inc.
About this entry
Cite this entry
Luh, W., Kundur, D. (2006). Multimedia Fingerprinting. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/0-387-30038-4_153
Download citation
DOI: https://doi.org/10.1007/0-387-30038-4_153
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24395-5
Online ISBN: 978-0-387-30038-2
eBook Packages: Computer ScienceReference Module Computer Science and Engineering