Skip to main content
Log in

Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Fingerprinting provides a means of tracing unauthorized redistribution of digital data by individually marking each authorized copy with a personalized serial number. In order to prevent a group of users from collectively escaping identification, collusion-secure fingerprinting codes have been proposed. In this paper, we introduce a new construction of a collusion-secure fingerprinting code which is similar to a recent construction by Tardos but achieves shorter code lengths and allows for codes over arbitrary alphabets. We present results for ‘symmetric’ coalition strategies. For binary alphabets and a false accusation probability \(\varepsilon_1\) , a code length of \(m\approx \pi^2 c_0^2\ln\frac{1}{\varepsilon_1}\) symbols is provably sufficient, for large c 0, to withstand collusion attacks of up to c 0 colluders. This improves Tardos’ construction by a factor of 10. Furthermore, invoking the Central Limit Theorem in the case of sufficiently large c 0, we show that even a code length of \(m\approx 1/2\pi^2 c_0^2\ln\frac{1}{\varepsilon_1}\) is adequate. Assuming the restricted digit model, the code length can be further reduced by moving from a binary alphabet to a q-ary alphabet. Numerical results show that a reduction of 35% is achievable for q = 3 and 80% for q = 10.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Andrews G.E., Askey R., Roy R.: Special Functions. Encyclopedia of Mathematics and its Applications. Cambridge University Press (1999).

  • Bazant M.Z.: Random walks and diffusion. Technical report, MIT Lecture notes, http://www-math.mit.edu/18.366/lec/lec04.pdf (2005). Accessed October 2007

  • Boneh D., Shaw J. (1998). Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5): 1897–1905

    Article  MATH  MathSciNet  Google Scholar 

  • Chor B., Fiat A., Naor M., Pinkas B. (2000). Tracing traitors. IEEE Trans. Inform. Theory 46(3): 893–910

    Article  MATH  Google Scholar 

  • Cox I.J., Miller M.L., Bloom J.A. (2002). Digital Watermarking. Morgan Kaufmann Publishers, San Francisco, CA, USA

    Google Scholar 

  • Devroye L.: Non-Uniform Random Variate Generation. Springer-Verlag (1986). Available online at http://cg.scs.carleton.ca/~luc/rnbookindex.htm.

  • Digital Cinema Initiatives, LLC. Digital cinema system specification v1.1. http://www.dcimovies.com/DCI_DCinema_System_Spec_v1_1.pdf (2007). Accessed October 2007

  • Hollmann H.D.L., van Lint J.H., Linnartz J-P., Tolhuizen L.M.G.M. (1998). On codes with the identifiable parent property. J. Comb. Theory 82: 472–479

    Article  Google Scholar 

  • Langelaar G.C., Setyawan I., Lagendijk R.L. (2000). Watermarking digital image and video data. IEEE SPMAG 17(5): 20–46

    Google Scholar 

  • Peikert C., Shelat A., Smith A.: Lower bounds for collusion-secure fingerprinting. In: Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 472–478 (2003).

  • Škorić B., Vladimirova T.U., Celik M., Talstra J.C.: Tardos fingerprinting is better than we thought. Technical report, Submitted to IEEE Trans. Inform. Theory. Preprint at arXiv repository, http://www.arxiv.org/abs/cs.CR/0607131 (2006).

  • Staddon J.N., Stinson D.R., Wei R. (2001). Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inform. Theory 47(3): 1042–1049

    Article  MATH  MathSciNet  Google Scholar 

  • Tardos G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC), pp. 116–125 (2003).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Boris Škorić.

Additional information

Communicated by H. van Tilborg.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Škorić, B., Katzenbeisser, S. & Celik, M.U. Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr. 46, 137–166 (2008). https://doi.org/10.1007/s10623-007-9142-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-007-9142-x

Keywords

AMS Classification

Navigation