Abstract
Fingerprinting provides a means of tracing unauthorized redistribution of digital data by individually marking each authorized copy with a personalized serial number. In order to prevent a group of users from collectively escaping identification, collusion-secure fingerprinting codes have been proposed. In this paper, we introduce a new construction of a collusion-secure fingerprinting code which is similar to a recent construction by Tardos but achieves shorter code lengths and allows for codes over arbitrary alphabets. We present results for ‘symmetric’ coalition strategies. For binary alphabets and a false accusation probability \(\varepsilon_1\) , a code length of \(m\approx \pi^2 c_0^2\ln\frac{1}{\varepsilon_1}\) symbols is provably sufficient, for large c 0, to withstand collusion attacks of up to c 0 colluders. This improves Tardos’ construction by a factor of 10. Furthermore, invoking the Central Limit Theorem in the case of sufficiently large c 0, we show that even a code length of \(m\approx 1/2\pi^2 c_0^2\ln\frac{1}{\varepsilon_1}\) is adequate. Assuming the restricted digit model, the code length can be further reduced by moving from a binary alphabet to a q-ary alphabet. Numerical results show that a reduction of 35% is achievable for q = 3 and 80% for q = 10.
Similar content being viewed by others
References
Andrews G.E., Askey R., Roy R.: Special Functions. Encyclopedia of Mathematics and its Applications. Cambridge University Press (1999).
Bazant M.Z.: Random walks and diffusion. Technical report, MIT Lecture notes, http://www-math.mit.edu/18.366/lec/lec04.pdf (2005). Accessed October 2007
Boneh D., Shaw J. (1998). Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5): 1897–1905
Chor B., Fiat A., Naor M., Pinkas B. (2000). Tracing traitors. IEEE Trans. Inform. Theory 46(3): 893–910
Cox I.J., Miller M.L., Bloom J.A. (2002). Digital Watermarking. Morgan Kaufmann Publishers, San Francisco, CA, USA
Devroye L.: Non-Uniform Random Variate Generation. Springer-Verlag (1986). Available online at http://cg.scs.carleton.ca/~luc/rnbookindex.htm.
Digital Cinema Initiatives, LLC. Digital cinema system specification v1.1. http://www.dcimovies.com/DCI_DCinema_System_Spec_v1_1.pdf (2007). Accessed October 2007
Hollmann H.D.L., van Lint J.H., Linnartz J-P., Tolhuizen L.M.G.M. (1998). On codes with the identifiable parent property. J. Comb. Theory 82: 472–479
Langelaar G.C., Setyawan I., Lagendijk R.L. (2000). Watermarking digital image and video data. IEEE SPMAG 17(5): 20–46
Peikert C., Shelat A., Smith A.: Lower bounds for collusion-secure fingerprinting. In: Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 472–478 (2003).
Škorić B., Vladimirova T.U., Celik M., Talstra J.C.: Tardos fingerprinting is better than we thought. Technical report, Submitted to IEEE Trans. Inform. Theory. Preprint at arXiv repository, http://www.arxiv.org/abs/cs.CR/0607131 (2006).
Staddon J.N., Stinson D.R., Wei R. (2001). Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inform. Theory 47(3): 1042–1049
Tardos G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC), pp. 116–125 (2003).
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by H. van Tilborg.
Rights and permissions
About this article
Cite this article
Škorić, B., Katzenbeisser, S. & Celik, M.U. Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr. 46, 137–166 (2008). https://doi.org/10.1007/s10623-007-9142-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-007-9142-x