Skip to main content

Improvement of Collusion Secure Convolutional Fingerprinting Information Codes

  • Conference paper
Information Theoretic Security (ICITS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4883))

Included in the following conference series:

Abstract

This paper presents, analyzes and improves the false positive problem detected in Convolutional Fingerprinting Information Codes presented by Zhu et al. The codes are a concatenation of a convolutional code and a Boneh-Shaw code. In their paper Zhu et al. present a code construction that is not necessarily c-secure with ε-error because in their modified detection algorithm the standard Viterbi error probability analysis cannot be directly applied. In this case we show that false positives appear, that is to say, the problem of accusing an innocent and legal user of an illegal redistribution. In this paper, we give a bound on the probability of false positives and justify it analytically and by simulations. Moreover, some guidelines for a correct design of this family of codes is also given.

This work has been supported partially by the Spanish Research Council (CICYT) Project TSI2005-07293-C02-01 (SECONNET), by the Spanish Ministry of Science and Education with CONSOLIDER CSD2007-00004 (ARES) and by Generalitat de Catalunya with the grant 2005 SGR 01015 to consolidated research groups.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wagner, N.R.: Fingerprinting. In: SP 1983: Proceedings of the 1983 IEEE Symposium on Security and Privacy, Washington, DC, USA, p. 18. IEEE Computer Society, Los Alamitos (1983)

    Google Scholar 

  2. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data (extended abstract). In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)

    Google Scholar 

  3. Barg, A., Blakley, G.R., Kabatiansky, G.A.: Digital fingerprinting codes: problem statements, constructions, identification of traitors. IEEE Transactions on Information Theory 49(4), 852–865 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  4. Zhu, Y., Zou, W., Zhu, X.: Collusion secure convolutional fingerprinting information codes. In: ASIACCS 2006: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp. 266–274. ACM Press, New York (2006)

    Chapter  Google Scholar 

  5. Hamming, R.W.: Error detecting and error correcting codes. Bell System Techincal Journal 29, 147–160 (1950)

    MathSciNet  Google Scholar 

  6. Forney Jr., G.: Convolutional codes i: Algebraic structure. IEEE Transactions on Information Theory 16(6), 720–738 (1970)

    Article  MATH  MathSciNet  Google Scholar 

  7. Lin, S., Costello Jr., D.J.: Error Control Coding: Fundamentals and Applications. Prentice-Hall, Englewood Cliffs (1983)

    Google Scholar 

  8. Viterbi, A.J.: CDMA: principles of spread spectrum communication. Addison Wesley Longman Publishing Co., Inc., Redwood City (1995)

    MATH  Google Scholar 

  9. Viterbi, A.J., Omura, J.K.: Principles of Digital Communication and Coding. McGraw-Hill, Inc., New York (1979)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tomàs-Buliart, J., Fernandez, M., Soriano, M. (2009). Improvement of Collusion Secure Convolutional Fingerprinting Information Codes. In: Desmedt, Y. (eds) Information Theoretic Security. ICITS 2007. Lecture Notes in Computer Science, vol 4883. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10230-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10230-1_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10229-5

  • Online ISBN: 978-3-642-10230-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics