Joint coding and embedding techniques for multimediafingerprinting

S He, M Wu - IEEE Transactions on Information Forensics and …, 2006 - ieeexplore.ieee.org
Digital fingerprinting protects multimedia content from illegal redistribution by uniquely
marking every copy of the content distributed to each user. The collusion attack is a powerful …

Combinatorial schemes for protecting digital content

SR Blackburn - Surveys in combinatorics, 2003 - books.google.com
When digital information is widely distributed in some fashion, the distributor would often like
to trace the source of pirate copies of the information. The paper surveys some of the …

Some improved bounds for secure frameproof codes and related separating hash families

DR Stinson, GM Zaverucha - IEEE Transactions on Information …, 2008 - ieeexplore.ieee.org
We present some improved bounds on necessary conditions for separating hash families of
type {w, w} and type {w, w-1}. In particular, these bounds apply to secure frame-proof codes …

A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure

K Nuida - … Theoretic Security: 4th International Conference, ICITS …, 2010 - Springer
A c-secure fingerprint code is called robust if it is secure against a limited number of bit
erasure in undetectable positions in addition to usual collusion attacks. In this article, we …

A short random fingerprinting code against a small number of pirates

M Hagiwara, G Hanaoka, H Imai - … Symposium, AAECC-16, Las Vegas, NV …, 2006 - Springer
In this paper, we propose a variant of Tardos code which is practical for various applications
against a small number of pirates. As an example of our results, for c= 5, the code length …

Performance study on multimedia fingerprinting employing traceability codes

S He, M Wu - International Workshop on Digital Watermarking, 2005 - Springer
Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by
uniquely marking copies of the content distributed to each user. Collusion attack is a …

Group-oriented anti-collusion fingerprint based on bibd code

Y Yu, H Lu, X Chen, Z Zhang - 2010 2nd International …, 2010 - ieeexplore.ieee.org
Digital fingerprinting is a technique for identifying unauthorized copy and tracing back to its
user. The distributor marks each individual copy with a unique fingerprint. At present, the …

Local and global structure preserving hashing for fast digital fingerprint tracing

C Liu, H Ling, F Zou, Y Wang, H Feng, L Yan - Multimedia Tools and …, 2015 - Springer
Digital fingerprinting is a promising approach to protect multimedia contents from
unauthorized redistribution. Whereas, large scale and high dimensionality make existing …

An improvement of short 2-secure fingerprint codes strongly avoiding false-positive

K Nuida - International Workshop on Information Hiding, 2009 - Springer
A 2-secure fingerprint code proposed by Nuida et al.(IEEE CCNC 2007) has very desirable
characteristics that false-positive never occur under Marking Assumption against at most two …

Explicit construction of secure frameproof codes

D Tonien, R Safavi-Naini - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Abstract $\Gamma $ is a $ q $-ary code of length $ L $. A word $ w $ is called a descendant
of a coalition of codewords $ w^{(1)}, w^{(2)},\dots, w^{(t)} $ of $\Gamma $ if at each position …