2007
DOI: 10.1007/s00530-007-0096-7
|View full text |Cite
|
Sign up to set email alerts
|

On error-correcting fingerprinting codes for use with watermarking

Abstract: Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal copy appears, it can be traced back to the guilty user. By using collusion-secure codes, the fingerprinting system is made secure against cut-and-paste attacks. In this paper we study the interface between the collusion-secure fingerprinting codes and the underlying watermarking scheme, and we construct several codes which are both er… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(18 citation statements)
references
References 20 publications
0
18
0
Order By: Relevance
“…In any practical implementation, they must be combined with an embedding scheme. The resulting system has two layers [6,12]: The coding layer determines which message to embed and protects against collusion attacks. The underlying watermarking layer hides symbols in segments of the content.…”
Section: Collusion Attacks Against Forensic Watermarkingmentioning
confidence: 99%
“…In any practical implementation, they must be combined with an embedding scheme. The resulting system has two layers [6,12]: The coding layer determines which message to embed and protects against collusion attacks. The underlying watermarking layer hides symbols in segments of the content.…”
Section: Collusion Attacks Against Forensic Watermarkingmentioning
confidence: 99%
“…In any practical implementation, they must be combined with some kind of embedding scheme. The resulting system has two layers [9,19]: The coding layer determines which message to embed and protects against collusion attacks. The underlying watermarking layer hides symbols of the message in segments of the content.…”
Section: Collusion Attacks Against Forensic Watermarkingmentioning
confidence: 99%
“…Such a full analysis is important for the following reason. As (19) shows, it is advantageous for the attackers not only to decreaseμ, but also to modify the shape of R m such that R inv m (ε 1 ) increases, i.e. such that the right-hand tail of the innocent's accusation probability becomes longer.…”
Section: The Gaussian Approximationmentioning
confidence: 99%
“…Thus this attacker model is less strong than the one we use; codes for their model, based on the Boneh-Shaw code, can be found in [4,8].…”
Section: Related Workmentioning
confidence: 99%
“…As these are only codes, they must be combined with some kind of embedding scheme (or modulation), such as a watermarking system. This can be viewed as a two-layer model [5,8], where the coding layer encodes user identities to protect against collusion attacks, and the underlying watermarking layer hides the message in the digital contents.…”
Section: Introductionmentioning
confidence: 99%