Identification of traitors in algebraic-geometric traceability codes

In a fingerprinting scheme, a distributor places marks in each copy of a digital object. Placing different marks in different copies uniquely identifies the recipient of each copy and therefore allows the tracing of the source of an unauthorized redistribution. A widely used approach to the fingerprinting problem is the use of error-correcting codes with a suitable minimum distance. With this approach, the set of embedded marks in a given copy is precisely a codeword of the error correcting code. The focus of this paper is in the identification of traitors when the error-correcting code is an algebraic-geometric (AG) code. The authors present a tracing algorithm that employs the Guruswami-Sudan soft-decision list decoding algorithm to find all provably identifiable dishonest users.

[1]  Alexander Vardy,et al.  Algebraic soft-decision decoding of Reed-Solomon codes , 2003, IEEE Trans. Inf. Theory.

[2]  Reihaneh Safavi-Naini,et al.  Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.

[3]  Tran van Trung,et al.  On a Class of Traceability Codes , 2004, Des. Codes Cryptogr..

[4]  Jessica Staddon,et al.  Efficient Traitor Tracing Algorithms Using List Decoding , 2001, ASIACRYPT.

[5]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[6]  Henning Stichtenoth,et al.  Algebraic function fields and codes , 1993, Universitext.

[7]  Venkatesan Guruswami,et al.  Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.

[8]  Alexander Barg,et al.  Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.

[9]  Jörg Schwenk,et al.  Combining digital watermarks and collusion-secure fingerprints for digital images , 1999, Electronic Imaging.

[10]  Kannan Ramchandran,et al.  Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[11]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[12]  Venkatesan Guruswami,et al.  List decoding of error correcting codes , 2001 .

[13]  Reihaneh Safavi-Naini,et al.  New results on frame-proof codes and traceability schemes , 2001, IEEE Trans. Inf. Theory.

[14]  Birgit Pfitzmann,et al.  Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.

[15]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..

[16]  Hyoung Joong Kim,et al.  Modified Patchwork Algorithm: a novel audio watermarking scheme , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[17]  Jessica Staddon,et al.  Applications of list decoding to tracing traitors , 2003, IEEE Trans. Inf. Theory.

[18]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[19]  Jacobus H. van Lint,et al.  Generalized Reed - Solomon codes from algebraic geometry , 1987, IEEE Trans. Inf. Theory.

[20]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..