Abstract
Digital Fingerprinting is a technique for the merchant who can embed unique buyer identity marks into digital media copy and also makes it possible to identify ’traitors’ who redistribute their illegal copies. This paper first discusses the collusion-resistant properties of spread-spectrum sequence against malicious attacks such as collusion combination, collusion average and additive noise. A novel two-layers secure fingerprinting scheme is then presented by concatenating the spread-spectrum code with a convolutional code. Moreover, Viterbi algorithm is improved by using Optional Code Set. The code length, collusion security and performance are proved and analyzed. As the results, the proposed scheme for perceptual media has shorter fingerprinting length and achieves optimal traitor searching.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Cox, I.J., Kilian, J., Shamoon, T., Leighton, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing 6(12), 1673–1687 (1997)
Ergun, F., Kilian, J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)
Barg, A., Blakly, G.R., Kabatiansky, G.: Digital Fingerprinting Codes: Problem Statements, Constructions, Identification of Traitors, Technical report, DIMACS2001-52 (2001)
Silverberg, A., Staddon, J., Walker, J.: Efficient Traitor Tracing Algorithms Using List Decoding. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 175–192. Springer, Heidelberg (2001)
Fernandez, M., Soriano, M.: Identification of Traitors in Algebraic-Geometric Traceability Codes. IEEE Trans. on Signal Processing. Supplement on Secure Media 52(10), 3073–3077 (2004)
Kilian, J., Leighton, F.T., Matheson, L.R., Shamoon, T.G., Tarjan, R.E., Zane, F.: Resistance of Digital Watermarks to Collusive Attacks. Technical Report TR-585-98, Princeton University, Computer Science Department (July 1998), http://citeseer.ist.psu.edu/kilian98/resistance.html
Zhu, Y., Sun, Z.W., Feng, D.G., Yang, Y.T.: Performance Analysis of Spread Spectrum CDMA Watermarking and Applied Reasearch in Multiwavelet Domain. Chinese Journal of Computers (2005) (in print)
Chan, F., Haccoun, D.: Adaptive Viterbi Decoding of Convolutional Codes over Memoryless Channels. Transactions on Communications 45(11), 1389–1400 (1997)
Forney Jr., G.D.: Convolutional Codes I: Algebraic Structure. IEEE Trans. on Information Theory IT-16(6), 720–738 (1970)
Zhu, Y., Feng, D.G., Yang, Y.T.: Convolutional Fingerprinting Information Codes for Collusion Security. In: Proceedings of the SPIE conference on Mathematics of Data/Image Coding, Compression, and Encryption VIII with Applications, San Diego (August 2005) (to appear)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, Y., Feng, D., Zou, W. (2005). Collusion Secure Convolutional Spread Spectrum Fingerprinting. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_6
Download citation
DOI: https://doi.org/10.1007/11551492_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28768-1
Online ISBN: 978-3-540-32052-4
eBook Packages: Computer ScienceComputer Science (R0)