Digital fingerprinting: Problems and solutions

被引:0
作者
Hu D. [1 ]
Luo J. [2 ]
机构
[1] School of Information, Hunan University of Commerce, Changsha 410205, Hunan
[2] Department of Economic Trade Management, Hunan Railway Professional Technology College, Zhuzhou 412001, Hunan
关键词
Collusion resistance; Digital copyright protection; Digital fingerprinting; Information hiding; Secure multimedia distribution;
D O I
10.1504/IJICS.2011.044822
中图分类号
学科分类号
摘要
Encryption can provide multimedia data with the desired security during transmission. However, once a piece of multimedia content is decrypted, the dishonest customer can redistribute it arbitrarily. Digital fingerprinting is an emerging technology for copyright protection of multimedia data, where unique identification information called fingerprint is embedded into each distributed copy. Once an unauthorised content copy is found somewhere, the embedded fingerprint can uniquely identify the source of the leakage. There are three main problems with digital fingerprinting systems, which are collusion attack, the distribution of the marked copies and the fairness of both the merchant and the customer. In this paper, we summarise the current state-of-the-art of the solutions to the main problems of digital fingerprinting. © 2011 Inderscience Enterprises Ltd.
引用
收藏
页码:316 / 331
页数:15
相关论文
共 55 条
[1]  
Adelsbach A., Huber U., Sadeghi A.-R., Fingercasting - Joint fingerprinting and decryption of broadcast messages, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4058, pp. 136-147, (2006)
[2]  
Akashi N., Et al., Hierarchical construction of tardos code, Proceedings of the 2008 International Symposium on Information Theory and its Applications, pp. 1-6, (2008)
[3]  
Anderson R., Manifavas C., Chameleon - A New Kind of Stream Cipher, Lecture Notes in Computer Science, 1267, pp. 107-113, (1997)
[4]  
Bao F., Multimedia content protection by cryptography and watermarking in tamper-resistant hardware, Proceedings of the 2000 ACM Workshops on Multimedia, pp. 139-142, (2000)
[5]  
Barg A., Blakley G.R., Kabatiansky G., Digital fingerprinting codes: Problem statements, constructions, identification of traitors, IEEE Transactions on Information Theory, 49, 4, pp. 852-865, (2003)
[6]  
Blakley G., Meadows C., Purdy G., Fingerprinting long forgiving messages, Proceedings of the 1985 Crypto, pp. 180-189, (1985)
[7]  
Blayer O., Tassa T., Improved versions of tardos' fingerprinting scheme, Designs, Codes and Cryptography, 48, 1, pp. 79-103, (2008)
[8]  
Boneh D., Shaw J., Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, 44, 5, pp. 1897-1905, (1998)
[9]  
Briscoe B., Fairman I., Nark: Receiver based multicast key management and non-repudiation, British Telecom Technical Report, (1999)
[10]  
Brown I., Perkins C., Crowcroft J., Watercasting: Distributed watermarking of multicast media, Proceedings of the 1999 International COST264 Workshop on Networked Group Communication, pp. 286-300, (1999)