Error- and Collusion-Secure Fingerprinting for Digital Data

作者: Hans-Jürgen Guth , Birgit Pfitzmann

DOI: 10.1007/10719724_10

关键词:

摘要: Fingerprinting means making copies of the same data identifiable by hiding additional information (a fingerprint) in data. Embedding can be done watermarking techniques, which are mainly a branch signal processing. Most methods, however, do not treat colluding adversaries who have obtained more than one copy, compare their copies, see differences and use this to make copy without fingerprint. Therefore, there cryptographic fingerprinting methods obtain collusion tolerance on top layer. But most important method Boneh Shaw excludes priori any errors layer, i.e., it is assumed that no changes fingerprint occur except those based from attacks. This stronger assumption what underlying schemes offer.

参考文章(20)
Funda Ergun, Joe Kilian, Ravi Kumar, A note on the limits of collusion-resistant watermarks theory and application of cryptographic techniques. pp. 140- 149 ,(1999) , 10.1007/3-540-48910-X_10
Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn, Attacks on Copyright Marking Systems information hiding. pp. 218- 238 ,(1998) , 10.1007/3-540-49380-8_16
Ingemar J. Cox, Joe Kilian, Tom Leighton, Talal Shamoon, A Secure, Robust Watermark for Multimedia information hiding. pp. 185- 206 ,(1996) , 10.1007/3-540-61996-8_41
Lesley R. Matheson, Stephen G. Mitchell, Talal G. Shamoon, Robert E. Tarjan, Francis Zane, Robustness and Security of Digital Watermarks financial cryptography. pp. 227- 240 ,(1998) , 10.1007/BFB0055486
Ingrid Biehl, Bernd Meyer, Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract) symposium on theoretical aspects of computer science. pp. 399- 412 ,(1997) , 10.1007/BFB0023476
G. R. Blakley, C. Meadows, G. B. Purdy, Fingerprinting long forgiving messages international cryptology conference. pp. 180- 189 ,(1985) , 10.1007/3-540-39799-X_15
Birgit Pfitzmann, Michael Waidner, Asymmetric fingerprinting for larger collusions computer and communications security. pp. 151- 160 ,(1997) , 10.1145/266420.266453
D. R. Stinson, R. Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes SIAM Journal on Discrete Mathematics. ,vol. 11, pp. 41- 53 ,(1998) , 10.1137/S0895480196304246
Joel Spencer, The Probabilistic Method ,(1991)
D.R. Stinson, Tran van Trung, R. Wei, Secure frameproof codes, key distribution patterns, group testing algorithms and related structures Journal of Statistical Planning and Inference. ,vol. 86, pp. 595- 617 ,(2000) , 10.1016/S0378-3758(99)00131-7