Skip to main content

A secure code for recipient watermarking against conspiracy attacks by all users

  • Session 14: Intellectual Property Protection
  • Conference paper
  • First Online:
Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

Abstract

To protect copyrights of data from illegal copying, a scheme called recipient watermarking which can specify dishonest users who got the data legally and copied it illegally has been studied. A recipient watermarking consists of two processes, called coding process and embedding process. Even though there exists a secure embedding process on which it is impossible to erase the codeword by conspiracy of users, there are some cases that they can make the data by which the server cannot specify even one of them as a illegal user because of the defect of the coding process of the information about users.

In this paper, we propose a secure code for recipient watermarking against any conspiracy attacks including the attack by all users. The proposed code can specify two dishonest users who are in conspiracy and this code is more fair than such code proposed previously. We analyze the relation between probabilities to succeed attacks and conspiracy patterns, and show the security of our code.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting long forgiving messages, Advances in Cryptology-CRYPTO '85, LNCS 218, pp.180–189, Springer-Verlag, 1986.

    Google Scholar 

  2. Boneh, D., Shaw,J.: Collusion-secure fingerprinting for digital data, Advances in Cryptology-CRYPTO '95, LNCS 963, pp.452–465, Springer-Verlag, 1995.

    Google Scholar 

  3. Macq, B.M., Quisquater, J.-J.: Cryptology for digital TV broadcasting, Proc. of the IEEE, Vol.85, No.6, pp.944–957, June 1995.

    Article  Google Scholar 

  4. Zhao, J.: A WWW service to embed and prove digital copyright watermarks, Proc. of ECMAST '96, pp.695–709, 1996.

    Google Scholar 

  5. Delaigle, J.-F., Boucqueau, J.-M., Quisquater, J.-J., Macq, B.: Digital images protection techniques in a broadcast framework: an overview, Proc. of ECMAST '96, pp.710–727, 1996.

    Google Scholar 

  6. Simon, C., Goray E., Vercken, G., Delivet, B., Delaigle, J.-F., Bouqueau, J-.M.: Digital images protection management in a broadcast framework: overview/TALISMAN solution,” Proc. of ECMAST '96, pp.729–746, 1996.

    Google Scholar 

  7. Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting, Advances in CryptologyEUROCRYPTO '96, LNCS 1070, pp. 84–95, Springer-Verlag, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Watanabe, H., Kasami, T. (1997). A secure code for recipient watermarking against conspiracy attacks by all users. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028497

Download citation

  • DOI: https://doi.org/10.1007/BFb0028497

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics