Tracing illegal redistribution using errors-anderasures and side information decoding algorithms

In a fingerprinting scheme, a distributor places marks in each copy of a digital object. Placing different marks in different copies uniquely identifies the recipient of each copy, and therefore allows tracing of the source of an unauthorised redistribution. A widely used approach to the fingerprinting problem is the use of error correcting codes with a suitable large minimum distance. With this approach, the set of embedded marks in a given copy is precisely a code word of the error correcting code. We present two different approaches that use side information for the tracing process. The first approach deals uses the Guruswami–Sudan errors-and-erasures list decoding algorithm whereas the second approach shows the use of a full side information matrix.

[1]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[2]  Venkatesan Guruswami,et al.  Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.

[3]  Amos Fiat,et al.  Tracing Traitors , 1994, CRYPTO.

[4]  Jessica Staddon,et al.  Applications of list decoding to tracing traitors , 2003, IEEE Trans. Inf. Theory.

[5]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[6]  S. Pope,et al.  The application of error control to communications , 1987, IEEE Communications Magazine.

[7]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[8]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[9]  Jean-Paul M. G. Linnartz,et al.  On Codes with the Identifiable Parent Property , 1998, J. Comb. Theory, Ser. A.

[10]  Min Wu,et al.  Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.

[11]  Alexander Barg,et al.  Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.

[12]  Birgit Pfitzmann,et al.  Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.

[13]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[14]  Alexander Vardy,et al.  Algebraic soft-decision decoding of Reed-Solomon codes , 2003, IEEE Trans. Inf. Theory.

[15]  Reihaneh Safavi-Naini,et al.  Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.

[16]  Miguel Soriano,et al.  Fingerprinting Concatenated Codes with Efficient Identification , 2002, ISC.