A simple fingerprinting scheme for large user groups

被引:5
作者
Hu, Defa [1 ]
Li, Qiaoliang [2 ]
机构
[1] Hunan Univ Commerce, Sch Informat, Changsha 410205, Hunan, Peoples R China
[2] Hunan Normal Univ, Coll Math & Comp, Changsha 410081, Hunan, Peoples R China
来源
FRONTIERS OF COMPUTER SCIENCE IN CHINA | 2011年 / 5卷 / 02期
关键词
digital fingerprinting; digital copyright protection; identity matrix; collusion resistance; MULTIMEDIA; WATERMARKING;
D O I
10.1007/s11704-011-9163-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital fingerprinting is an emerging technology to protect multimedia data from piracy, where each distributed copy is labeled with unique identification information. In coded fingerprinting, each codeword of the anti-collusion code is used to represent a user's fingerprint. In real-world applications, the number of potential users can be very large and hence, the used anti-collusion code should be easy to construct and have as many codewords as possible. This paper proposes a simple coded fingerprinting scheme, where the anti-collusion code is constructed with an identity matrix. The main advantage of our scheme is its simplicity, as a large number of fingerprints can easily be generated to accommodate a large number of users. To improve collusion resistance, some transformations are performed on the original fingerprint in the embedding phase and the corresponding inverse transformations are performed on the extracted sequence in the detection phase.
引用
收藏
页码:163 / 168
页数:6
相关论文
共 46 条
  • [31] A simple encoder scheme for distributed residual video coding
    Hu, Chunyun
    Zhao, Yafan
    Yu, Long
    Jiang, Yang
    Xiong, Yunhui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (27-28) : 20061 - 20078
  • [32] Anti-collusion fingerprinting scheme based on error correction ability of nonlinear combinatorial code
    Huang, Wanjun
    Panahi, Issa M. S.
    WIRELESS SENSING AND PROCESSING II, 2007, 6577
  • [33] Generalized Fibonacci broadcasting: An efficient VOD scheme with user bandwidth limit
    Yan, Mingjun Edward
    Kameda, Tsunehiko
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (16) : 2418 - 2429
  • [34] User Authentication Scheme Based on Fast-Walsh Hadamard Transform
    Remya, A. R.
    Sreekumar, A.
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [35] Simple and Compact Flow Fingerprinting Robust to Transit Through Low-latency Anonymous Networks
    Xue, Yang
    Vasserman, Eugene Y.
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [36] Watermarking scheme for large images using parallel processing
    Debes, E
    Dardier, G
    Ebrahimi, T
    Herrigel, A
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 26 - 34
  • [37] A new efficient fingerprint-based remote user authentication scheme for multimedia systems
    Yoon, EJ
    Yoo, KY
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 332 - 338
  • [38] Influence of a large image watermarking scheme parallelization on possible attacks
    Escoda, OD
    Ventura, RMFI
    Debes, E
    Ebrahimi, T
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XXIV, 2001, 4472 : 175 - 186
  • [39] A Pen Locating Scheme for Large-size Electronic Whiteboards
    Zhou, Wenjie
    Duan, Xiaohui
    2017 IEEE INTERNATIONAL CONFERENCE ON IMAGING SYSTEMS AND TECHNIQUES (IST), 2017, : 22 - 27
  • [40] A collusion-resistant certificateless provable data possession scheme for shared data with user revocation
    Guang Yang
    Lidong Han
    Jingguo Bi
    Fuqun Wang
    Cluster Computing, 2024, 27 : 2165 - 2179