Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information

نویسندگان

  • Miguel Soriano
  • Marcel Fernandez
  • Josep Cotrina Navau
چکیده

In a fingerprinting scheme a distributor places marks in each copy of a digital object. Placing different marks in different copies, uniquely identifies the recipient of each copy, and therefore allows to trace the source of an unauthorized redistribution. A widely used approach to the fingerprinting problem is the use of error correcting codes with a suitable minimum distance. With this approach, the set of embedded marks in a given copy is precisely a codeword of the error correcting code. We present two different approaches that use side information for the tracing process. The first one uses the Guruswami-Sudan soft-decision list decoding algorithm and the second one a modified version of the Viterbi algorithm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography

Information transmission and steganography p. 15 On the existence of perfect stegosystems p. 30 Towards multi-class blind steganalyzer for JPEG images p. 39 An efficient fingerprinting scheme with symmetric and commutative encryption p. 54 Collusion secure convolutional spread spectrum fingerprinting p. 67 Performance study on multimedia fingerprinting employing traceability codes p. 84 Regular...

متن کامل

Determining contribution of different landuse of sand dunes sediments using fingerpriting

Recognition of origin of sand dunes is very important in wind erosion control projects. Because of many problems associated with traditional procedures for identifying sediment sources, fingerprinting techniques, based on physical, chemical and organic properties of sediment and source materials, are increasingly being used as a valuable and effective alternative approach to assembling such inf...

متن کامل

Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors

As the markets of digital contents over computer networks become more popular, illegal redistribution of contents by a buyer becomes the more serious problem. To deter illegal redistribution, various fingerprinting schemes have been proposed. The fingerprinting schemes enable merchants to embed information which identifies the original buyer to the purchased content. Identifying the original bu...

متن کامل

Determining Land Units Contributions to Suspended Sediment Yield Using Sediment Fingerprinting Method (Case Study: Tull Bane Basin, Golestan Province)

Fingerprint method is one of the new methods to determine the contribution of suspended sediment in the land units. In this method, a suitable composite (set) of diagnostic properties and a multivariate mixing model are employed to estimate the relative contribution of sediment sources to sediments transported to watershed outlet. This research carried out in the Tull Bane watershed with 3278.9...

متن کامل

منشأیابی منابع رسوب: ارتباط بین فعالیت‌‌های آنزیمی خاک و رسوب

Sediment sources fingerprinting is needed as an autonomous tool for erosion prediction, validation of soil erosion models, monitoring of sediment budget and consequently for selecting soil conservation practices and sediment control methods at the catchment scale. Apportioning of eroded-soil into multiple sources using natural tracers is an integrated approach in soil erosion and sediment studi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005