Traitor Tracing for Shortened and Corrupted Fingerprints

We consider tracing fingerprinted media data such as images and video data. We consider pirate objects that are constructed by a group of up to c colluders who have used a range of attacks including ‘cut and paste’, averaging (to weaken the embedded marks), and cropping (to remove part of the fingerprint). We have two main results: First, we give an efficient algorithm for tracing shortened fingerprints that are obtained from a class of generalized Reed-Solomon codes. Second, we propose combined mark detection and tracing using soft-decision decoding and show that it gives a more powerful tracing algorithm. We conclude the paper by discussing our results and giving possible directions for future research.

[1]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[2]  Aggelos Kiayias,et al.  On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.

[3]  Venkatesan Guruswami,et al.  Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.

[4]  Venkatesan Guruswami,et al.  List decoding of error correcting codes , 2001 .

[5]  Douglas R. Stinson,et al.  Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..

[6]  Jessica Staddon,et al.  Efficient Traitor Tracing Algorithms Using List Decoding , 2001, ASIACRYPT.

[7]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[8]  G. David Forney,et al.  Generalized minimum distance decoding , 1966, IEEE Trans. Inf. Theory.

[9]  Birgit Pfitzmann,et al.  Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.

[10]  Madhu Sudan,et al.  Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..

[11]  Amos Fiat,et al.  Dynamic Traitor Tracing , 2001, Journal of Cryptology.

[12]  Reihaneh Safavi-Naini,et al.  Sequential Traitor Tracing , 2000, CRYPTO.

[13]  Yvo Desmedt,et al.  Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.

[14]  Douglas R. Stinson,et al.  Frameproof and IPP Codes , 2001, INDOCRYPT.

[15]  Birgit Pfitzmann,et al.  Trials of Traced Traitors , 1996, Information Hiding.

[16]  Alexander Vardy,et al.  Algebraic soft-decision decoding of Reed-Solomon codes , 2003, IEEE Trans. Inf. Theory.

[17]  Reihaneh Safavi-Naini,et al.  Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.

[18]  Douglas R. Stinson,et al.  Key Preassigned Traceability Schemes for Broadcast Encryption , 1998, Selected Areas in Cryptography.

[19]  Reihaneh Safavi-Naini,et al.  New results on frame-proof codes and traceability schemes , 2001, IEEE Trans. Inf. Theory.

[20]  Jacobus H. van Lint,et al.  Introduction to Coding Theory , 1982 .

[21]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[22]  Jessica Staddon,et al.  Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.

[23]  Jörg Schwenk,et al.  Combining digital watermarks and collusion-secure fingerprints for digital images , 1999, Electronic Imaging.

[24]  Aggelos Kiayias,et al.  Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.

[25]  Amos Fiat,et al.  Dynamic Traitor Training , 1999, CRYPTO.

[26]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.

[27]  Jean-Paul M. G. Linnartz,et al.  On Codes with the Identifiable Parent Property , 1998, J. Comb. Theory, Ser. A.