Design and Analysis of High-Capacity Anti-Collusion Hiding Codes

نویسندگان

  • Byung-Ho Cha
  • C.-C. Jay Kuo
چکیده

A new methodology for the design of high-capacity anti-collusion hiding codes in a large-scale fingerprint-based traitor tracing system is proposed in this work. We consider a hiding code of MN bits, where M bits are used as the user ID and N bits are the length of the spreading codes. Since each user is assigned one out of 2 ID numbers and one out of N spreading codewords, the total number of users is equal to 2N . To accommodate an even larger number of users, we propose a shifted spreading scheme that shifts the spreading codeword circularly by a certain amount. By allowing P shifts (with P mod N ), the total number of users increases from 2N to 2NP . When multiple users perform a weighted collusion attack, we show that the task of identifying colluders and their attack weights can be formulated as a user detection and channel estimation problem in a multiuser wireless communication system with a multipath fading channel. For the latter, there exist code design techniques that choose the spreading codes carefully so as to reduce multiaccess interference of users with different spreading codewords effectively. By exploiting this analogy, we develop an anti-collusion code called OSIFT (Orthogonal Spreading followed by the Inverse Fourier Transform). We compare several hiding codes in a fingerprinting system consisting of hundreds of colluders. It is demonstrated by computer simulation that, when the OSIFT code is adopted, colluders and their attack weights can be found by the proposed fingerprinting system more accurately.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bias Equalizer for Binary Probabilistic Fingerprinting Codes

In binary probabilistic fingerprinting codes, the number of symbols “0” and “1” is generally balanced because of the design of the codeword. After a collusion attack, the balance of symbols is not always assured in a pirated codeword. It is reported in [8] that if the number of symbols in a pirated codeword is unbalanced, then a tracing algorithm can be improved by equalizing the unbalanced sym...

متن کامل

High rate fingerprinting codes and the fingerprinting capacity

Including a unique code in each copy of a distributed document is an effective way of fighting intellectual piracy. Codes designed for this purpose that are secure against collusion attacks are called fingerprinting codes. In this paper we consider fingerprinting with the marking assumption and design codes that achieve much higher rates than previous constructions. We conjecture that these cod...

متن کامل

Collusion Resistant Fingerprinting In DCT Domain

Digital fingerprinting is a technique for identifying users who use multimedia content for unintended purposes, such as redistribution. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cost-effective attack against such digital fingerprints is collusion, where several differently marked copies of t...

متن کامل

Best Security Index for Digital Fingerprinting

Digital watermarking used for fingerprinting may receive a collusion attack; two or more users collude, compare their data, find a part of embedded watermarks, and make an unauthorized copy by masking their identities. In this paper, assuming that at most c users collude, we give a characterization of the fingerprinting codes that have the best security index in a sense of “(c, p/q)-secureness”...

متن کامل

Fingerprinting Codes for Live Pay-Television Broadcast Via Internet

In recent years, with the rapid growth of the Internet as well as the increasing demand for broadband services, live pay-television broadcasting via internet has become a promising business. To get this implemented, it is necessary to protect distributed contents from illegal copying and redistributing after they are accessed. Fingerprinting system is a useful tool for it. This paper shows that...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008