A simple fingerprinting scheme for large user groups

被引:5
作者
Hu, Defa [1 ]
Li, Qiaoliang [2 ]
机构
[1] Hunan Univ Commerce, Sch Informat, Changsha 410205, Hunan, Peoples R China
[2] Hunan Normal Univ, Coll Math & Comp, Changsha 410081, Hunan, Peoples R China
来源
FRONTIERS OF COMPUTER SCIENCE IN CHINA | 2011年 / 5卷 / 02期
关键词
digital fingerprinting; digital copyright protection; identity matrix; collusion resistance; MULTIMEDIA; WATERMARKING;
D O I
10.1007/s11704-011-9163-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital fingerprinting is an emerging technology to protect multimedia data from piracy, where each distributed copy is labeled with unique identification information. In coded fingerprinting, each codeword of the anti-collusion code is used to represent a user's fingerprint. In real-world applications, the number of potential users can be very large and hence, the used anti-collusion code should be easy to construct and have as many codewords as possible. This paper proposes a simple coded fingerprinting scheme, where the anti-collusion code is constructed with an identity matrix. The main advantage of our scheme is its simplicity, as a large number of fingerprints can easily be generated to accommodate a large number of users. To improve collusion resistance, some transformations are performed on the original fingerprint in the embedding phase and the corresponding inverse transformations are performed on the extracted sequence in the detection phase.
引用
收藏
页码:163 / 168
页数:6
相关论文
共 46 条
  • [41] A collusion-resistant certificateless provable data possession scheme for shared data with user revocation
    Yang, Guang
    Han, Lidong
    Bi, Jingguo
    Wang, Fuqun
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2165 - 2179
  • [42] AN OWNERSHIP PROTECTION SCHEME BASED ON VISUAL CRYPTOGRAPHY AND THE LAW OF LARGE NUMBERS
    Hou, Young-Chang
    Huang, Pei-Hsiu
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (06): : 4147 - 4156
  • [43] A Large Payload Data Hiding Scheme Using Scalable Secret Reference Matrix
    Lin, Jason
    Chia-Wei Tsai
    Chun-Wei Yang
    Kuan-Hung Liu
    SYMMETRY-BASEL, 2022, 14 (04):
  • [44] A methodology for constructing user-oriented requirements specifications for large-scale systems using electronic hypermedia
    Overmyer S.P.
    Requirements Engineering, 1999, 4 (1) : 1 - 18
  • [45] Path switching - A quasi-static routing scheme for large-scale ATM packet switches
    Lee, TT
    Lam, CH
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1997, 15 (05) : 914 - 924
  • [46] A Mobile-aware Adaptive Rate Control Scheme for Improving the User Perceived QoS of Multimedia Streaming Services in Wireless Broadband Networks
    Koo, Jahon
    Chung, Kwangsue
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (06): : 1152 - 1168