Collusion-secure fingerprinting for digital data (original) (raw)

A collusion-resistant fingerprinting system for restricted distribution of digital documents

PloS one, 2013

Digital fingerprinting is a technique that consists of inserting the ID of an authorized user in the digital content that he requests. This technique has been mainly used to trace back pirate copies of multimedia content such as images, audio, and video. This study proposes the use of state-of-the-art digital fingerprinting techniques in the context of restricted distribution of digital documents. In particular, the system proposed by Kuribayashi for multimedia content is investigated. Extensive simulations show the robustness of the proposed system against average collusion attack. Perceptual transparency of the fingerprinted documents is also studied. Moreover, by using an efficient Fast Fourier Transform core and standard computer machines it is shown that the proposed system is suitable for real-world scenarios.

New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting

Lecture Notes in Computer Science

In this paper, we discuss collusion-secure traceability codes for digital fingerprinting which is a technique for copyright protection of digital contents. We first state a generalization of conventional collusion attacks where illicit users of a digital content collude to create an illegal digital content. Then we propose a collusion-secure traceability code which can detect at least one colluder against it. We show the rate and properties of the proposed traceability code.

Fingerprinting Codes for Multimedia Data against Averaging Attack

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009

Code construction for digital fingerprinting, which is a copyright protection technique for multimedia, is considered. Digital fingerprinting should deter collusion attacks, where several fingerprinted copies of the same content are mixed to disturb their fingerprints. In this paper, we consider the averaging attack, which is known to be effective for multimedia fingerprinting with the spread spectrum technique. We propose new methods for constructing fingerprinting codes to increase the coding rate of conventional fingerprinting codes, while they guarantee to identify the same number of colluders. Due to the new fingerprinting codes, the system can deal with a larger number of users to supply digital contents.

SCIENCE & TECHNOLOGY An ID-based Secure and Flexible Buyer-seller Watermarking Protocol for Copyright Protection

2017

Digital watermarking protocols are the one, which have combined fingerprinting technique with watermarking, for embedding digital signal or watermark into an original multimedia object. Buyer-seller watermarking protocol is fundamentally applied to continue the digital rights of both buyers and seller. We proposed an identity-based buyer-seller watermarking protocol that encounters various weaknesses of Zhang et al.'s watermarking protocol. We ensured that by pointing out these weaknesses, inaccuracy can be minimised for further implementing the buyer-seller watermarking protocol. The suggested protocol uses ID-based public key cryptography and digital watermarking scheme to place the ownership of digital content. Hence, copyright protection is attained. We claim that our suggested protocol is efficient and has adequate security as compared to traditionally proposed protocols, and therefore suitable for any practical buyer-seller watermarking scheme.

Coded Fingerprinting based Watermarking to Resist Collusion Attacks and Trace Colluders

The alteration, repackaging, and redistribution of multimedia content like image, video, audio, etc. poses a serious threat to both national security and commercial markets. Presently with the growing popularity of digital media the world is becoming smaller and smaller. That is mainly due to the internet connectivity and WWW phenomena. But the copyright protection of intellectual properties has become a necessity for prevention of illegal copying and verification of content integrity. Here wavelet transform plays the role of an efficient and robust tool due to its multi-resolution capability along with singular value decomposition (SVD) for watermarking. Both of these when implemented with coded fingerprinting not only resist collusion attacks but can also help tracing colluders. This work here by focuses implementation of a hybrid watermarking scheme using SVD and wavelet transform along with coded fingerprinting developed for protection of the intellectual property.

Multimedia content screening using a dual watermarking and fingerprinting system

Proceedings of the tenth ACM international conference on Multimedia - MULTIMEDIA '02, 2002

We present a new dual watermarking and fingerprinting system, where initially all copies of a protected object are identically watermarked using a secret key, but individual detection keys are distinct. By knowing a detection key, an adversary cannot recreate the original content from the watermarked content. However, knowledge of any one detection key is sufficient for modifying the object so that a detector using that key would fail to detect the marks. Detectors using other detection keys would not be fooled, and such a modified object necessarily contains enough information about the broken detector key-the fingerprint. Our dual system limits the scope of possible attacks, when compared to classic fingerprinting systems. Under optimal attacks, the size of the collusion necessary to remove the marks without leaving a detectable fingerprint is superlinear in object size, whereas classic fingerprinting has a lower bound on collusion resistance that is approximately fourth root in object size. By using our scheme one can achieve collusion resistance of up to 900,000 users for a two hour high-definition video.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds

Sensors

With the emerging growth of digital data in information systems, technology faces the challenge of knowledge prevention, ownership rights protection, security, and privacy measurement of valuable and sensitive data. On-demand availability of various data as services in a shared and automated environment has become a reality with the advent of cloud computing. The digital fingerprinting technique has been adopted as an effective solution to protect the copyright and privacy of digital properties from illegal distribution and identification of malicious traitors over the cloud. Furthermore, it is used to trace the unauthorized distribution and the user of multimedia content distributed through the cloud. In this paper, we propose a novel fingerprinting technique for the cloud environment to protect numeric attributes in relational databases for digital privacy management. The proposed solution with the novel fingerprinting scheme is robust and efficient. It can address challenges such...

A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

Eurasip Journal on Advances in Signal Processing, 2006

We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues-buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.

Near-optimal collusion-secure fingerprinting codes for efficiently tracing illegal re-distribution

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012

Digital fingerprinting provides a means of tracing unauthorized re-distribution of digital objects. With an unique fingerprint being imperceptibly embedded in each authorized copy of the object, in case a pirate copy is found, by analysing the fingerprint in the observed pirate copy, the distributer can identify the users who produced the pirate copy. Collusion-secure fingerprinting schemes address the problem of collusion, where a group of users (a coalition) detect and change the fingerprint symbols in their copies before producing pirate copies. It has been proved that there exist collusion-secure fingerprinting schemes that can identify at least one member of the coalition for any reasonably sized coalition. In order to guarantee the quality of the object, short fingerprinting codes are preferred in practical applications. A lower bound on the code length has been derived by Peikert et al, that is, any collusion-secure fingerprinting codes must have length at least o(s 2 log(1/s )), where s is the size of coalition. Codes which achieve the lower bound are called optimal codes. However, currently known optimal codes do not have any efficient (polynomial time-complexity) tracing procedure to identify the coalition. The best known codes with efficient tracing algorithms, which were constructed by Cortrina-Navau and Fernández in 2010, have length O(s 6 log(s/ )log(N )), where N is the total number of authorized users. In this paper, we construct a class of codes which have an efficient tracing algorithm and have length O(s 2 log(1/ )log(N )). Our codes are much shorter than those by Cortrina-Navau and Fernández.