Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information
نویسندگان
چکیده
In a fingerprinting scheme a distributor places marks in each copy of a digital object. Placing different marks in different copies, uniquely identifies the recipient of each copy, and therefore allows to trace the source of an unauthorized redistribution. A widely used approach to the fingerprinting problem is the use of error correcting codes with a suitable minimum distance. With this approach, the set of embedded marks in a given copy is precisely a codeword of the error correcting code. We present two different approaches that use side information for the tracing process. The first one uses the Guruswami-Sudan soft-decision list decoding algorithm and the second one a modified version of the Viterbi algorithm.
منابع مشابه
A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography
Information transmission and steganography p. 15 On the existence of perfect stegosystems p. 30 Towards multi-class blind steganalyzer for JPEG images p. 39 An efficient fingerprinting scheme with symmetric and commutative encryption p. 54 Collusion secure convolutional spread spectrum fingerprinting p. 67 Performance study on multimedia fingerprinting employing traceability codes p. 84 Regular...
متن کاملDetermining contribution of different landuse of sand dunes sediments using fingerpriting
Recognition of origin of sand dunes is very important in wind erosion control projects. Because of many problems associated with traditional procedures for identifying sediment sources, fingerprinting techniques, based on physical, chemical and organic properties of sediment and source materials, are increasingly being used as a valuable and effective alternative approach to assembling such inf...
متن کاملCoin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors
As the markets of digital contents over computer networks become more popular, illegal redistribution of contents by a buyer becomes the more serious problem. To deter illegal redistribution, various fingerprinting schemes have been proposed. The fingerprinting schemes enable merchants to embed information which identifies the original buyer to the purchased content. Identifying the original bu...
متن کاملDetermining Land Units Contributions to Suspended Sediment Yield Using Sediment Fingerprinting Method (Case Study: Tull Bane Basin, Golestan Province)
Fingerprint method is one of the new methods to determine the contribution of suspended sediment in the land units. In this method, a suitable composite (set) of diagnostic properties and a multivariate mixing model are employed to estimate the relative contribution of sediment sources to sediments transported to watershed outlet. This research carried out in the Tull Bane watershed with 3278.9...
متن کاملمنشأیابی منابع رسوب: ارتباط بین فعالیتهای آنزیمی خاک و رسوب
Sediment sources fingerprinting is needed as an autonomous tool for erosion prediction, validation of soil erosion models, monitoring of sediment budget and consequently for selecting soil conservation practices and sediment control methods at the catchment scale. Apportioning of eroded-soil into multiple sources using natural tracers is an integrated approach in soil erosion and sediment studi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005