On the systematic generation of Tardos’s fingerprinting codes

Digital fingerprinting is used to trace back illegal users, where unique ID known as digital fingerprints is embedded into a content before distribution. On the generation of such fingerprints, one of the important properties is collusion-resistance. Binary codes for fingerprinting with a code length of theoretically minimum order were proposed by Tardos, and the related works mainly focused on the reduction of the code length were presented. In this paper, we present a concrete and systematic construction of the Tardospsilas fingerprinting code using a chaotic map. Using a statistical model for correlation scores, a proper threshold for detecting colluders is calculated. Furthermore, for the reduction of computational costs required for the detection, a hierarchical structure is introduced on the codewords. The collusion-resistance of the generated fingerprinting codes is evaluated by a computer simulation.

[1]  Min Wu,et al.  Group-Oriented Fingerprinting for Multimedia Forensics , 2004, EURASIP J. Adv. Signal Process..

[2]  Naoki Hayashi,et al.  Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique , 2007, IWSEC.

[3]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[4]  Dengguo Feng,et al.  Collusion Secure Convolutional Spread Spectrum Fingerprinting , 2005, IWDW.

[5]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[6]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[7]  Stefan Katzenbeisser,et al.  Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes , 2008, Des. Codes Cryptogr..

[8]  Gábor Tardos,et al.  Optimal probabilistic fingerprint codes , 2003, STOC '03.

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Min Wu,et al.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.

[11]  Hideki Imai,et al.  Optimization of Memory Usage in Tardos's Fingerprinting Codes , 2006, cs/0610036.

[12]  Phatak,et al.  Logistic map: A possible random-number generator. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[13]  Min Wu,et al.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.

[14]  Muratani Hirofumi,et al.  Tardos's Fingerprinting Codes Shortened by Optimizing Code Generation Probabilities and Improving Tracing Algorithm , 2007 .

[15]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[16]  Yacov Yacobi,et al.  Improved Boneh-Shaw Content Fingerprinting , 2001, CT-RSA.

[17]  Boris Skoric,et al.  Tardos Fingerprinting is Better Than We Thought , 2006, IEEE Transactions on Information Theory.