Abstract
The fingerprinting technique consists in making the copies of a digital object unique by embedding a different set of marks in each copy. However, a coalition of dishonest users can create pirate copies that try to disguise their identities. We show how equidistant, binary codes that can be used as fingerprinting codes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Forney, G.D.: The Viterbi algorithm. Proc. IEEE 61, 268–278 (1973)
Seshadri, N., Sundberg, C.-E.W.: List Viterbi decoding algorithmswith applications. IEEE Trans. Comm. 42, 313–323 (1994)
Wagner, N.: Fingerprinting. In: Proceedings of the 1983 IEEE Symposium on Security and Privacy, April 1983, pp. 18–22 (1983)
Wolf, J.K.: Efficient maximum likelihood decoding of linear block codes using a trellis. IEEE Trans. Inform. Theory 24, 76–80 (1978)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fernandez, M., Soriano, M., Cotrina, J. (2005). Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3481. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424826_56
Download citation
DOI: https://doi.org/10.1007/11424826_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25861-2
Online ISBN: 978-3-540-32044-9
eBook Packages: Computer ScienceComputer Science (R0)