Skip to main content

Multimedia Fingerprinting

  • Reference work entry
Encyclopedia of Multimedia
  • 257 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. N. R. Wagner, “Fingerprinting,” Proceedings of IEEE Symposium on Security and Privacy, 1983, pp. 18–22.

    Google Scholar 

  2. D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,” IEEE Transactions on Information Theory, Vol. 44, September 1998, pp. 1897–1905.

    MATH  MathSciNet  Google Scholar 

  3. A. Barg, G. R. Blakley, and G. A. Kabatiansky, “Digital fingerprinting codes: Problem statements, constructions, identification of traitors,” IEEE Transactions on Information Theory, Vol. 49, April 2003, pp. 852–865.

    MATH  MathSciNet  Google Scholar 

  4. W. Luh and D. Kundur, “Digital media fingerprinting: techniques and trends,” in Handbook of Multimedia Security, B. Furht and D. Kirovski, Eds. CRC Press, 2004, pp. 567–594.

    Google Scholar 

  5. G. Tardos, “Optimal probabilistic fingerprint codes,” Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003, pp. 116–125.

    Google Scholar 

  6. M. Wu, W. Trappe, Z. J. Wang, and K. J. R. Liu, “Collusion-resistant fingerprinting for multimedia,” IEEE Signal Processing Magazine, March 2004, pp. 15–27.

    Google Scholar 

  7. J. Dittmann, A. Behr, M. Stabenau, P. Schmitt, J. Schwenk, and J. Ueberberg, “Combining digital watermarks and collusion secure fingerprints for digital images,” SPIE Journal of Electronic Imaging, Vol. 9, pp. 456–467, 2000.

    Google Scholar 

  8. R. Safavi-Naini and Y. Wang, “Collusion secure q-ary fingerprinting for perceptual content,” in Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, pp. 57–75.

    Google Scholar 

  9. F. Sebe and J. Domingo-Ferrer, “Scattering codes to implement short 3-secure fingerprinting for copyright protection,” Electronics Letters, Vol. 38, No. 17, 2002, pp. 958–959.

    Google Scholar 

  10. V. D. To, R. Safavi-Naini, and Y. Wang, “A 2-secure code with efficient tracing algorithm,” Proceedings in the Third International Conference on Cryptology, 2002, pp. 149–162.

    Google Scholar 

  11. J. Domingo-Ferrer and J. Herrera-Joancomarti, “Simple collusion-secure fingerprinting schemes for images,” Proceedings of the International Symposium on Information Technology, March 2000, pp. 128–132.

    Google Scholar 

  12. Z. J.Wang, M. Wu, W. Trappe, and K. J. R. Liu, “Group-oriented fingerprinting for multimedia forensics,” EURASIP Journal on Applied Signal Processing, Vol. 14, 2004, pp. 2153–2173.

    Google Scholar 

  13. G. R. Blakley, C. Meadows, and G. B. Purdy, “Fingerprinting long forgiving messages,” in Lecture notes in computer sciences — On Advances in cryptology, 1986, Vol. 218, pp. 180–189.

    MathSciNet  Google Scholar 

  14. B. Chor, A. Fiat, M. Naor, and B. Pinkas, “Tracing traitors,” IEEE Transactions on Information Theory, Vol. 46, No. 5, 2000, pp. 893–910.

    MATH  Google Scholar 

  15. A. Silverberg, J. Staddon, and J. Walker, “Applications of list decoding to tracing traitors,” IEEE Transactions on Information Theory, Vol. 49, No. 5, 2003, pp. 1312–1318.

    MATH  MathSciNet  Google Scholar 

  16. M. Fernandez and M. Soriano, “Soft-decision tracing in fingerprinted multimedia content,” IEEE Transactions on Multimedia, Vol. 11, No. 2, 2004, pp. 38–46.

    Google Scholar 

  17. H. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, “Nonlinear collusion attacks on independent fingerprints for multimedia,” Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003, pp. 613–616.

    Google Scholar 

  18. P. Moulin and A. Briassouli, “The Gaussian fingerprinting game,” Proceedings of the Conference on Information Sciences and Systems, Princeton, NJ, March 2002.

    Google Scholar 

  19. J. K. Su, J. J. Eggers, and B. Girod, “Capacity of digital watermarks subjected to an optimal collusion attack,” Proceedings of the European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland, 2000.

    Google Scholar 

  20. A. Somekh-Baruch and N. Merhav, “On the capacity game of private fingerprinting systems under collusion attacks,” IEEE Transactions on Information Theory, Vol. 51, No. 3, March 2005, pp. 884–889.

    MathSciNet  Google Scholar 

  21. M. U. Celik, G. Sharma, and A. M. Tekalp, “Collusion-resilient fingerprinting using random pre-warping,” IEEE Signal Processing Letters, Vol. 11, pp. 831–835, October 2004.

    Google Scholar 

  22. W. Luh and D. Kundur, “New paradigms for effective multicasting and fingerprinting of entertainment media,” IEEE Communications Magazine, June 2005, accepted.

    Google Scholar 

  23. R. Parviainen and P. Parnes, “Large scale distributed watermarking of multicast media through encryption,” in Proc. of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues of the New Century, 2001, Vol. 64, pp. 149–158.

    Google Scholar 

  24. H. Zhao and K. J. R. Liu, “Bandwidth efficient fingerprint multicast for video streaming,” Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, May 2004.

    Google Scholar 

  25. D. Kirovski, H. S. Malvar, and Y. Yacobi, “Multimedia content screening using a dual watermarking and fingerprinting system,” IEEE Multimedia Magazine, Vol. 11, No. 3, pp. 59–73, 2004.

    Google Scholar 

  26. I. Brown, C. Perkins, and J. Crowcroft, “Watercasting: Distributed watermarking of multicast media,” in Network Group Communications, November 1999, pp. 286–300.

    Google Scholar 

  27. P. Q. Judge and M. H. Ammar, “Whim: Watermarking multicast video with a hierarchy of intermediaries,” Proceedings of the NOSSDAC, June 2000, pp. 699–712.

    Google Scholar 

  28. R. Anderson and C. Manifavas, “Chameleon — a new kind of stream cipher,” in Fast Software Encryption, Haifa, Israel, January 1997, pp. 107–113.

    Google Scholar 

  29. D. Kundur and K. Karthik, “Digital fingerprinting and encryption principles for digital rights management,” Proceedings of the IEEE Special Issue on Enabling Security Technologies for Digital Rights Management, Vol. 92, No. 6, June 2004, pp. 918–932.

    Google Scholar 

  30. B. Pfitzmann and M. Schunter, “Asymmetric fingerprinting,” Lecture Notes in Computer Science, Vol. 1070, 1996, pp. 84–95.

    Google Scholar 

  31. B. Pfitzmann and M. Waidner, “Anonymous fingerprinting,” Lecture Notes in Computer Science, Vol. 1233, 1997, pp. 88–102.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science+Business Media, Inc.

About this entry

Cite this entry

Luh, W., Kundur, D. (2006). Multimedia Fingerprinting. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/0-387-30038-4_153

Download citation

Publish with us

Policies and ethics