New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting

  • Hideki Yagi
  • Toshiyasu Matsushima
  • Shigeichi Hirasawa
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4298)


In this paper, we discuss collusion-secure traceability codes for digital fingerprinting which is a technique for copyright protection of digital contents. We first state a generalization of conventional collusion attacks where illicit users of a digital content collude to create an illegal digital content. Then we propose a collusion-secure traceability code which can detect at least one colluder against it. We show the rate and properties of the proposed traceability code.


Digital Content Parity Check Matrix Collusion Attack Average Attack Maximum Distance Separable 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44, 1897–1905 (1998)zbMATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing traitors. IEEE Trans. Inform. Theory 46, 893–910 (2000)zbMATHCrossRefGoogle Scholar
  3. 3.
    He, S., Wu, M.: Improving collusion resistance of error correcting code based multimedia fingerprinting. In: Proc. of 2005 IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP’05), vol. 2, pp. 1029–1032. IEEE, Los Alamitos (2005)Google Scholar
  4. 4.
    Jevtić, D.B.: Disjoint uniquely decodable codebooks for noiseless synchronized multiple-access adder channels generated by integer sets. IEEE Trans. Inform. Theory 38, 1142–1146 (1992)CrossRefMathSciNetGoogle Scholar
  5. 5.
    MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)zbMATHGoogle Scholar
  6. 6.
    Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inform. Theory 47, 1042–1049 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    Safavi-Naini, R., Wang, Y.: New results on frame-proof codes and traceability schemes. IEEE Trans. Inform. Theory 47, 3029–3033 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Safavi-Naini, R., Wang, Y.: Sequential Traitor Tracing. IEEE Trans. Inform. Theory 49, 1319–1326 (2003)zbMATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 51, 1069–1087 (2003)CrossRefMathSciNetGoogle Scholar
  10. 10.
    Wang, Z.J., Wu, M., Zhao, H.V., Trappe, W., Liu, K.J.R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans. Image Process. 14, 804–821 (2005)CrossRefGoogle Scholar
  11. 11.
    Podilchuk, C., Zeng, W.: Image adaptive watermarking using visual models. IEEE J. Select. Areas Commun. 16, 525–540 (1998)CrossRefGoogle Scholar

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Hideki Yagi
    • 1
  • Toshiyasu Matsushima
    • 2
  • Shigeichi Hirasawa
    • 2
  1. 1.Media Network Center, Waseda University, 1-6-1, Nishi Waseda, Shinjuku-ku Tokyo 169-8050Japan
  2. 2.School of Science and Engineering, Waseda University, 3-4-1 Ohkubo Shinjuku-ku, Tokyo, 169-8555Japan

Personalised recommendations