Abstract
Digital watermarking used for fingerprinting may receive a collusion attack; two or more users collude, compare their data, find a part of embedded watermarks, and make an unauthorized copy by masking their identities. In this paper, assuming that at most c users collude, we give a characterization of the fingerprinting codes that have the best security index in a sense of “(c,p/q)-secureness” proposed by Orihara et al. The characterization is expressed in terms of intersecting families of sets. Using a block design, we also show that a distributor of data can only find asymptotically a set of c users including at least one culprit, no matter how good fingerprinting code is used.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Beth, T., Jungnickel, D., Lenz, H.: Design Theory, 2nd edn. Cambridge University Press, Cambridge (1999)
Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting long forgiving messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 180–189. Springer, Heidelberg (1986)
Boneh, D., Shaw, J.: Collusion secure fingerprinting for digital data. IEEE Trans. on Information Theory 44(5), 1897–1905 (1998)
Cohen, G.D., Schaathun, H.G.: Upper bounds on separating codes. IEEE Trans. on Information Theory 50(6), 1291–1294 (2004)
Orihara, S., Mizuki, T., Nishizeki, T.: New security index for digital fingerprinting and its bounds. IEICE Trans. Fundamentals E86-A(5), 1156–1163 (2003)
Stinson, D.R., van Trung, T., Wei, R.: Secure frameproof codes, key distribution patterns, group testing algorithms and related structures. Journal of Statistical Planning and Inference 86(2), 595–617 (2000)
Yoshioka, K., Shikata, J., Matsumoto, T.: Collusion secure codes: Systematic security definitions and their relations. IEICE Trans. Fundamentals E87-A(5), 1162–1171 (2004)
Yoshioka, K., Shikata, J., Matsumoto, T.: On collusion security of random codes. IEICE Trans. Fundamentals E88-A(1), 296–304 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Banno, K., Orihara, S., Mizuki, T., Nishizeki, T. (2005). Best Security Index for Digital Fingerprinting. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_29
Download citation
DOI: https://doi.org/10.1007/11558859_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29039-1
Online ISBN: 978-3-540-31481-3
eBook Packages: Computer ScienceComputer Science (R0)