skip to main content
10.1145/1411328.1411347acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

On-off keying modulation and tardos fingerprinting

Published: 22 September 2008 Publication History

Abstract

We consider a particular design of fingerprinting code for multimedia contents, carefully motivated by a detailed analysis. This design is based on a two-layer approach: a probabilistic fingerprinting code a la Tardos coupled with a zero-bit side informed watermarking technique. The detection of multiple watermark presences in content blocks give birth to extended accusation processes, whose performances, assessed experimentally, are excellent. This prevents the colluders from mixing different content blocks, a class of collusion which is not encompassed in the classical marking assumption. Therefore, the collusion must stick to the block exchange strategy which is fully tackled by the fingerprinting code.

References

[1]
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory, 44:1897--1905, September 1998.
[2]
M. Fernandez and M. Soriano. Soft-decoding tracing in fingerprinted multimedia content. IEEE Multimedia, 11(2):38--46, 2004.
[3]
T. Furon and P. Bas. Broken arrows. submitted to EURASIP Jounal on Information Security, 2008.
[4]
M. Gursoy, H. Poor, and S. Verdù. On-off frequency-shift keying for wideband fading channels. EURASIP Journal on wireless communications and networking, 2006 (ID 98564):15 pages, 2006.
[5]
P. Moulin and N. Kiyavash. Performance of random fingerprinting codes under arbitrary nonlinear attacks. In Proc. ICASSP, Honolulu, avril 2007.
[6]
R. Safavi-Naini and Y. Wang. Collusion-secure q-ary fingerprinting for perceptual content. In Springer-Verlag, editor, Proc. Security and Privacy in Digital Rights Management, SPDRM'01, volume 2320 of Lecture Notes in Computer Science, pages 57--75, 2001.
[7]
A. Silverberg, J. R. Staddon, and J. Walker. Application of list decoding to tracing traitors. IEEE Trans. Inform. Theory, 49:1312--1318, may 2003.
[8]
B. Skoric, S. Katzenbeisser, and M. Celik. Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Designs, Codes and Cryptography, 46(2):137--166, February 2008.
[9]
Z. Wang, M. Wu, H. Zhao, W. Trappe, and K. Liu. Resistance of orthogonal gaussian fingerprints to collusion attacks. In Proc. of Int. Conf. on Acoustics, Speech and Signal Processing, pages 724--727, Hong Kong, April 2003. IEEE ICASSP'03.

Cited By

View all
  • (2024)StreamingTag: A Scalable Piracy Tracking Solution for Mobile Streaming ServicesIEEE Transactions on Mobile Computing10.1109/TMC.2024.344541123:12(14530-14543)Online publication date: 1-Dec-2024
  • (2022)DWT Collusion Resistant Video Watermarking Using Tardos Family Codes2022 IEEE 5th International Conference on Image Processing Applications and Systems (IPAS)10.1109/IPAS55744.2022.10053023(1-6)Online publication date: 5-Dec-2022
  • (2018)Architectural Building Protocols for Li-Fi (Light Fidelity)Emerging Wireless Communication and Network Technologies10.1007/978-981-13-0396-8_7(127-137)Online publication date: 10-Jun-2018
  • Show More Cited By

Index Terms

  1. On-off keying modulation and tardos fingerprinting

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and security
    September 2008
    242 pages
    ISBN:9781605580586
    DOI:10.1145/1411328
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 September 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anti-collusion
    2. fingerprinting
    3. watermarking

    Qualifiers

    • Research-article

    Conference

    MM&Sec '08
    Sponsor:
    MM&Sec '08: Multimedia and Security Workshop
    September 22 - 23, 2008
    Oxford, United Kingdom

    Acceptance Rates

    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)StreamingTag: A Scalable Piracy Tracking Solution for Mobile Streaming ServicesIEEE Transactions on Mobile Computing10.1109/TMC.2024.344541123:12(14530-14543)Online publication date: 1-Dec-2024
    • (2022)DWT Collusion Resistant Video Watermarking Using Tardos Family Codes2022 IEEE 5th International Conference on Image Processing Applications and Systems (IPAS)10.1109/IPAS55744.2022.10053023(1-6)Online publication date: 5-Dec-2022
    • (2018)Architectural Building Protocols for Li-Fi (Light Fidelity)Emerging Wireless Communication and Network Technologies10.1007/978-981-13-0396-8_7(127-137)Online publication date: 10-Jun-2018
    • (2017)Obfuscation in digital fingerprintingInternational Journal of Information and Coding Theory10.5555/3086613.30866204:2-3(185-200)Online publication date: 1-Jan-2017
    • (2017)A two-stage traitor tracing scheme for hierarchical fingerprintsMultimedia Tools and Applications10.1007/s11042-016-3749-876:12(14405-14435)Online publication date: 1-Jun-2017
    • (2015)Anticollusion solutions for asymmetric fingerprinting protocols based on client side embeddingEURASIP Journal on Information Security10.1186/s13635-015-0023-y2015:1Online publication date: 28-Aug-2015
    • (2015)Generalised tally-based decoders for traitor tracing and group testing2015 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS.2015.7368586(1-6)Online publication date: Nov-2015
    • (2015)A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing SchemesIEEE Transactions on Information Theory10.1109/TIT.2015.242825061:7(3882-3900)Online publication date: Jul-2015
    • (2015)Tally-Based Simple Decoders for Traitor Tracing and Group TestingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.240357510:6(1221-1233)Online publication date: Jun-2015
    • (2015)False Negative probabilities in Tardos codesDesigns, Codes and Cryptography10.1007/s10623-013-9856-x74:1(159-182)Online publication date: 1-Jan-2015
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media