Skip to main content

An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2513))

Included in the following conference series:

Abstract

In digital content distribution systems, digital watermarking (fingerprinting) technique provides a good solution to avoid illegal copying and has been studied very actively. c-secure CRT code is one of the most practical schemes for such fingerprinting since it is secure against collusion attacks even though random errors are added. But it is not sufficiently secure in the case that random errors are added. In this paper, a new ID coding scheme, Randomized c-secure CRT code, is presented. This new scheme improves the error tracing probabilities against collusion attacks with addition of random errors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Boneh and J. Shaw: “Collusion-Secure Fingerprinting for Digital Data,” Proc. of CRYPTO’95, LNCS963, pp. 452–465, Springer-Verlag, 1995.

    Google Scholar 

  2. J. Yoshida, K. Iwamura and H. Imai: “A Coding Method for Collusion-Secure Watermark and Less Decline,” Proc. of SCIS’98, 10.2.A, 1998(In Japanese).

    Google Scholar 

  3. D. Boneh and J. Shaw: “Collusion-Secure Fingerprinting for Digital Data,” IEEE Transactions on Information Theory, vol. 44, no. 5, pp. 1897–1905, 1998.

    Article  MATH  MathSciNet  Google Scholar 

  4. H-J. Guth and B. Pfitzmann: “Error-and Collusion-Secure Fingerprinting for Digital Data,” Proc. of IH’99, LNCS1768, pp. 134–145, Springer-Verlag, 2000.

    Google Scholar 

  5. H. Muratani: “Collusion Resilience of Digital Watermarking,” Proc. of SCIS2000, C-06, 2000(In Japanese).

    Google Scholar 

  6. H. Muratani: “A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience,” Proc. of IH 2001, LNCS2137, pp. 303–315, Springer-Verlag, 2001.

    Google Scholar 

  7. K. Yoshioka and T. Matsumoto: “Random-Error-Resilient Tracing Algorithm for Collusion-Secure Fingerprinting Code,” Technical Report of IEICE, ISEC2001-52, pp. 247–254, 2001 (In Japanese).

    Google Scholar 

  8. H. Muratani: “Combinatorial Outer Codes for c-Secure CRT Code,” Proc. of SCIS2002, Vol. 2, pp. 1009–1014, 2002(In Japanese).

    Google Scholar 

  9. K. Yoshioka and T. Matsumoto: “Random-Error-Resilient Tracing Algorithm for Collusion-Secure Fingerprinting Code (Part2),” Proc. of SCIS2002, Vol. 2, pp. 1021–1026, 2002(In Japanese).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Watanabe, H., Kitagawa, T. (2002). An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_15

Download citation

  • DOI: https://doi.org/10.1007/3-540-36159-6_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00164-5

  • Online ISBN: 978-3-540-36159-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics