Author:
Fernandez Marcel,Cotrina‐Navau Josep,Soriano Miguel
Abstract
PuposeThe purpose of this paper is to show that a fingerprinting code is a set of code words that are embedded in each copy of a digital object, with the purpose of making each copy unique. If the fingerprinting code is c‐secure, then the decoding of a pirate word created by a coalition of at most c dishonest users, will expose at least one of the guilty parties.Design/methodology/approachThe paper presents a systematic strategy for collusions attacking a fingerprinting scheme. As a particular case, this strategy shows that linear codes are not good fingerprinting codes. Based on binary linear equidistant codes, the paper constructs a family of fingerprinting codes in which the identification of guilty users can be efficiently done using minimum distance decoding. Moreover, in order to obtain codes with a better rate a 2‐secure fingerprinting code is also constructed by concatenating a code from the previous family with an outer IPP code.FindingsThe particular choice of the codes is such that it allows the use of efficient decoding algorithms that correct errors beyond the error correction bound of the code, namely a simplified version of the Chase algorithms for the inner code and the Koetter‐Vardy soft‐decision list decoding algorithm for the outer code.Originality/valueThe paper presents a fingerprinting code together with an efficient chasing algorithm.
Subject
Library and Information Sciences,Computer Science Applications,Information Systems
Reference9 articles.
1. Barg, A., Blakley, G.R. and Kabatiansky, G. (2003), “Digital fingerprinting codes: problem statements, constructions, identification of traitors”, IEEE Transactions on Information Theory, Vol. 49 No. 4, pp. 852‐65.
2. Boneh, D. and Shaw, J. (1998), “Collusion‐secure fingerprinting for digital data”, IEEE Transactions on Information Theory, Vol. 44 No. 5, pp. 1897‐905.
3. Bonisoli, A. (1984), “Every equidistant linear code is a sequence of dual hamming codes”, Ars Combinatoria, Vol. 18, pp. 181‐96.
4. Chase, D. (1972), “A class of algorithms for decoding block codes with channel measurement information”, IEEE Transactions on Information Theory, Vol. 18, pp. 170‐82.
5. Cohen, G., Encheva, S. and Schaathun, H.G. (2001), On Separating Codes, technical report, ENST, Paris.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献