A General Description of Pirate Strategies in a Binary Fingerprinting System
نویسندگان
چکیده
The paper describes all possible pirate strategies in a binary fingerprinting scheme. It is shown how to make a compact representation of the strategies by choosing representatives from equivalence classes of pirate strategies.
منابع مشابه
Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms
The fingerprinting technique consists in making the copies of a digital object unique by embedding a different set of marks in each copy. However, a coalition of dishonest users can create pirate copies that try to disguise their identities. We show how equidistant, binary codes that can be used as fingerprinting codes.
متن کاملEqual-Weight Fingerprinting Codes
We consider binary fingerprinting codes that trace at least one of t pirates using the marking assumption. Ensembles of binary equal-weight codes are considered along with a new efficient decoding algorithm. The design substantially increases the code rates of the former fingerprinting constructions. In particular, for large t, the new tfingerprinting codes have code rate of t−2 ln 2 and identi...
متن کاملRandom Codes for Digital Fingerprinting
Unlicensed, or illegal, copying of data is a problem in many areas. Despite various efforts in copy protection and copyright enforcement (both legal and technical), the problem still exists, and with the growing use of digital means of storing and distributing data the problem seems to be getting worse. Storing a unique, invisible marking in each distributed object is a possible way of dealing ...
متن کاملDynamic frameproof codes
There are many schemes in the literature for protecting digital data from piracy by the use of digital fingerprinting, such as frameproof codes, which prevent traitorous users from colluding to frame an innocent user, and traitortracing schemes, which enable the identification of users involved in piracy. The concept of traitor tracing has been applied to a digital broadcast setting in the form...
متن کاملA Collusion-Resistant Fingerprinting System for Restricted Distribution of Digital Documents
Digital fingerprinting is a technique that consists of inserting the ID of an authorized user in the digital content that he requests. This technique has been mainly used to trace back pirate copies of multimedia content such as images, audio, and video. This study proposes the use of state-of-the-art digital fingerprinting techniques in the context of restricted distribution of digital documen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000