Concatenated construction of traceability codes for multimedia fingerprinting
We develop a framework of construction strategies for traceability codes on the subject of multimedia fingerprinting, which constructs traceability codes in a concatenated way. In fingerprinting systems, there are tradeoffs among the size of the customer base, the collusion resilience, and the codew...
Saved in:
Published in | Optical Engineering Vol. 46; no. 10; pp. 107202 - 1072015 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
01.10.2007
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | We develop a framework of construction strategies for traceability codes on the subject of multimedia fingerprinting, which constructs traceability codes in a concatenated way. In fingerprinting systems, there are tradeoffs among the size of the customer base, the collusion resilience, and the codeword length. Our goal is to find a strategy to construct, traceability codes that reach an equilibrium among these tradeoffs. Instead of investigating a "high-performance" code, which has proven challenging in existing researches, we introduce a concatenated construction methodology to provide a flexible approach for producing more applicable traceability codes by composing several existing "low-performance" collusion-secure codes. Instead of just giving an example constructed by specific codes, we describe a general code construction strategy and give a detailed analysis on it. Moreover, we propose two concatenated construction schemes based on group fingerprinting to show the feasibility of the concatenated construction strategy. Experimental results show good performances on the code length, detection time, and tracing ability. |
---|---|
AbstractList | We develop a framework of construction strategies for traceability codes on the subject of multimedia fingerprinting, which constructs traceability codes in a concatenated way. In fingerprinting systems, there are tradeoffs among the size of the customer base, the collusion resilience, and the codeword length. Our goal is to find a strategy to construct, traceability codes that reach an equilibrium among these tradeoffs. Instead of investigating a "high-performance" code, which has proven challenging in existing researches, we introduce a concatenated construction methodology to provide a flexible approach for producing more applicable traceability codes by composing several existing "low-performance" collusion-secure codes. Instead of just giving an example constructed by specific codes, we describe a general code construction strategy and give a detailed analysis on it. Moreover, we propose two concatenated construction schemes based on group fingerprinting to show the feasibility of the concatenated construction strategy. Experimental results show good performances on the code length, detection time, and tracing ability. We develop a framework of construction strategies for traceability codes on the subject of multimedia fingerprinting, which constructs traceability codes in a concatenated way. In fingerprinting systems, there are tradeoffs among the size of the customer base, the collusion resilience, and the codeword length. Our goal is to find a strategy to construct, traceability codes that reach an equilibrium among these tradeoffs. Instead of investigating a 'high-performancea' code, which has proven challenging in existing researches, we introduce a concatenated construction methodology to provide a flexible approach for producing more applicable traceability codes by composing several existing 'low-performancea' collusion-secure codes. Instead of just giving an example constructed by specific codes, we describe a general code construction strategy and give a detailed analysis on it. Moreover, we propose two concatenated construction schemes based on group fingerprinting to show the feasibility of the concatenated construction strategy. Experimental results show good performances on the code length, detection time, and tracing ability. |
Author | Wu, Ja-Ling Huang, Chun-Hsiang Lin, Yu-Tzu |
Author_xml | – sequence: 1 givenname: Yu-Tzu surname: Lin fullname: Lin, Yu-Tzu organization: National Taiwan University, Department of Computer Science and Information Engineering, No. 1, Sec. 4, Roosevelt Road, Taipei, Taiwan 106 – sequence: 2 givenname: Ja-Ling surname: Wu fullname: Wu, Ja-Ling organization: National Taiwan University, Department of Computer Science and Information Engineering and Graduate Institute of Networking and Multimedia, No. 1, Sec. 4, Roosevelt Road, Taipei, Taiwan 106 – sequence: 3 givenname: Chun-Hsiang surname: Huang fullname: Huang, Chun-Hsiang organization: National Taiwan University, Department of Computer Science and Information Engineering, No. 1, Sec. 4, Roosevelt Road, Taipei, Taiwan 106 |
BookMark | eNptUE1LAzEQDaJgWz34D_YmHlYnySabPUrRKiiK6HnJ10pkm9Qke-i_N7XiQWSY7zcD783RoQ_eInSG4RJj3F7hS9J20GF8gGaYcagJBXqIZlBmNSWCH6N5Sh8AQDohZuhxGbyW2friptLBpxwnnV3wVRiqHKW2UrnR5W1ZGpuqIcRqPY3Zra1xshqcf7dxE53PpTpBR4Mckz39yQv0dnvzuryrH55W98vrh1rTFnKNh0EZrHFDWqpAM8O1YEpzw4FaYIwrJQ1TyljMxCBYB0CZUA0mxjacNnSBzvd_NzF8Tjblfu2StuMovQ1T6oXoGui68n6BrvZIHUNK0Q69dlnu-BVubuwx9Dvdetz_6FYuLv5cFHZrGbf_YskemzbO_uKenm9W1y9FYmj4LuJiLQEC3w39AtfGfbw |
CODEN | OPEGAR |
CitedBy_id | crossref_primary_10_1155_2011_502782 crossref_primary_10_1109_TIFS_2010_2082535 crossref_primary_10_1109_TIFS_2011_2170421 |
Cites_doi | 10.1023/A:1008209004667 10.1137/S0895480196304246 10.1117/1.2740765 10.1109/TIFS.2006.873596 10.1109/TSP.2003.809378 10.1109/GLOCOM.2004.1378028 10.1007/3-540-48658-5_25 10.1109/TIT.2003.810630 10.1109/ICASSP.2003.1202745 10.1155/S1110865704312151 10.1117/1.1287729 10.1109/83.650120 10.1007/3-540-47870-1_5 10.1007/3-540-48329-2_40 10.1007/3-540-44750-4_36 10.1023/A:1008268610932 10.1007/0-306-47791-2_16 |
ContentType | Journal Article |
Copyright | 2007
Society of Photo-Optical Instrumentation Engineers |
Copyright_xml | – notice: 2007 Society of Photo-Optical Instrumentation Engineers |
DBID | AAYXX CITATION 7SP 7U5 8FD L7M |
DOI | 10.1117/1.2790911 |
DatabaseName | CrossRef Electronics & Communications Abstracts Solid State and Superconductivity Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Solid State and Superconductivity Abstracts Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
DatabaseTitleList | Solid State and Superconductivity Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Visual Arts Engineering Physics |
EISSN | 1560-2303 |
EndPage | 1072015 |
ExternalDocumentID | 10_1117_1_2790911 OPEGAR000046000010107202000001 |
GroupedDBID | FQ0 UT2 -~X .DC 0R~ 123 29N 4.4 6TJ AAYXX ABEFU ABJNI ACGFO ACGFS ADMLS AENEX AFFNX AKROS ALMA_UNASSIGNED_HOLDINGS CITATION CS3 DU5 F5P HZ~ M4W M4X NU. O9- P-S P2P RNS SPBNH TAE TWZ WH7 XJE ~02 7SP 7U5 8FD L7M |
ID | FETCH-LOGICAL-c370t-1ffbd1c14273b0c5d6c85bc6d603e0556bbad5bbde158f85900358b412de46343 |
ISSN | 0091-3286 |
IngestDate | Fri Jul 11 00:11:23 EDT 2025 Thu Apr 24 23:08:22 EDT 2025 Tue Jul 01 04:05:39 EDT 2025 Tue Jun 19 12:42:01 EDT 2018 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c370t-1ffbd1c14273b0c5d6c85bc6d603e0556bbad5bbde158f85900358b412de46343 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
PQID | 889409927 |
PQPubID | 23500 |
PageCount | 964814 |
ParticipantIDs | proquest_miscellaneous_889409927 crossref_citationtrail_10_1117_1_2790911 crossref_primary_10_1117_1_2790911 spie_primary_OPEGAR000046000010107202000001 |
ProviderPackageCode | FQ0 UT2 CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2007-10-01 |
PublicationDateYYYYMMDD | 2007-10-01 |
PublicationDate_xml | – month: 10 year: 2007 text: 2007-10-01 day: 01 |
PublicationDecade | 2000 |
PublicationTitle | Optical Engineering |
PublicationYear | 2007 |
References | 2003; 49 2006; 1 1997; 6 2003; 51 2007; 46 1998; 11 2000; 9 1998; 14 1997; 12 10.1117/1.2790911_r13 10.1117/1.2790911_r11 10.1117/1.2790911_r10 10.1117/1.2790911_r17 Schaathun (10.1117/1.2790911_r12) 2006; 1 10.1117/1.2790911_r16 10.1117/1.2790911_r15 10.1117/1.2790911_r9 10.1117/1.2790911_r14 10.1117/1.2790911_r20 10.1117/1.2790911_r8 10.1117/1.2790911_r7 10.1117/1.2790911_r19 10.1117/1.2790911_r5 10.1117/1.2790911_r18 10.1117/1.2790911_r4 10.1117/1.2790911_r3 10.1117/1.2790911_r2 Stinson (10.1117/1.2790911_r6) 1998; 11 10.1117/1.2790911_r1 |
References_xml | – volume: 46 start-page: 057004 issue: 5 year: 2007 end-page: 057004 article-title: Practical fingerprinting system for Images publication-title: Opt. Eng. – volume: 12 start-page: 215 year: 1997 end-page: 243 article-title: On some methods for unconditionally secure key distribution and broadcast encryption publication-title: Designs, Codes, Cryptogr. – volume: 6 start-page: 1673 issue: 12 year: 1997 end-page: 1687 article-title: Secure spectrum watermarking for multimedia publication-title: IEEE Trans. Image Process. – volume: 9 start-page: 456 issue: 4 year: 2000 end-page: 467 article-title: Combining digital watermarks and collusion secure fingerprints for digital images publication-title: J. Electron. Imaging – volume: 11 start-page: 41 year: 1998 end-page: 53 article-title: Combinatorial properties and constructions of traceability schemes and frameproof codes publication-title: SIAM J. Discrete Math. – volume: 51 start-page: 1069 year: 2003 end-page: 1087 article-title: Anti-collusion fingerprinting for multimedia publication-title: IEEE Trans. Signal Process. – volume: 14 start-page: 261 year: 1998 end-page: 279 article-title: Some new results on key distribution patterns and broadcast encryption publication-title: Designs, Codes, Cryptogr. – volume: 1 start-page: 248 issue: 2 year: 2006 end-page: 255 article-title: The Boneh-Shaw fingerprinting scheme is better than we thought publication-title: IEEE Trans. Information Forensics and Security – volume: 49 start-page: 1312 year: 2003 end-page: 1318 article-title: Applications of list decoding to tracing traitors publication-title: IEEE Trans. Inf. Theory – ident: 10.1117/1.2790911_r4 doi: 10.1023/A:1008209004667 – ident: 10.1117/1.2790911_r13 – volume: 11 start-page: 41 issn: 0895-4801 year: 1998 ident: 10.1117/1.2790911_r6 publication-title: SIAM J. Discrete Math. doi: 10.1137/S0895480196304246 – ident: 10.1117/1.2790911_r10 – ident: 10.1117/1.2790911_r20 doi: 10.1117/1.2740765 – volume: 1 start-page: 248 year: 2006 ident: 10.1117/1.2790911_r12 publication-title: IEEE Trans. Information Forensics and Security doi: 10.1109/TIFS.2006.873596 – ident: 10.1117/1.2790911_r9 doi: 10.1109/TSP.2003.809378 – ident: 10.1117/1.2790911_r16 – ident: 10.1117/1.2790911_r19 doi: 10.1109/GLOCOM.2004.1378028 – ident: 10.1117/1.2790911_r2 doi: 10.1007/3-540-48658-5_25 – ident: 10.1117/1.2790911_r11 doi: 10.1109/TIT.2003.810630 – ident: 10.1117/1.2790911_r8 doi: 10.1109/ICASSP.2003.1202745 – ident: 10.1117/1.2790911_r17 doi: 10.1155/S1110865704312151 – ident: 10.1117/1.2790911_r7 doi: 10.1117/1.1287729 – ident: 10.1117/1.2790911_r15 doi: 10.1109/83.650120 – ident: 10.1117/1.2790911_r18 doi: 10.1007/3-540-47870-1_5 – ident: 10.1117/1.2790911_r3 doi: 10.1007/3-540-48329-2_40 – ident: 10.1117/1.2790911_r1 doi: 10.1007/3-540-44750-4_36 – ident: 10.1117/1.2790911_r5 doi: 10.1023/A:1008268610932 – ident: 10.1117/1.2790911_r14 doi: 10.1007/0-306-47791-2_16 |
SSID | ssj0002988 |
Score | 1.8375015 |
Snippet | We develop a framework of construction strategies for traceability codes on the subject of multimedia fingerprinting, which constructs traceability codes in a... |
SourceID | proquest crossref spie |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 107202 |
SubjectTerms | collusion resistance Composing Construction Construction specifications Feasibility Fingerprinting Multimedia multimedia security Resilience Strategy traceability codes traitor tracing |
Title | Concatenated construction of traceability codes for multimedia fingerprinting |
URI | http://dx.doi.org/10.1117/1.2790911 https://www.proquest.com/docview/889409927 |
Volume | 46 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3di9NAEF-0h6APoqdi_WIRH4SyZ7LZfD2W2rNIexVMpT6F3c3mPJCkmObB--ud_WiSwokfFEJZliHsbzMzOzvzG4TeKI9Jr6SMKEZjwlIVEw52n4CtjbSLKiPT7m11ES027OM23Pb9NE11yV6cyesb60r-B1UYA1x1lew_INsJhQH4D_jCExCG519hPKs1pauquHYbZd2TwZqb_x9cKsvC_XOiK9cN84LNIDT1IpPShPR0ZG9_MGDOTV3vbIhb9WyFXeaOJR342pLsuu1UemszbslyMHPRulj07FtbkYWu1rw8CjLEXbpapzhTnwTUsVY7xelih26DeL9RyKak_4zGKYjwe6tzuGm_WOfnm-Uyz-bb7DY6oeDt0xE6mb5fLT93JpWmiTWp7i0cRRQIf9eJPnYs-tPCqNldqYHPkD1A952zj6cWuYfolqpO0b0BBeQpumNScGUD41-umtbObh6h1RBbPMQW1yUeYosNthiwxT22-Bjbx2hzPs9mC-JaXxAZxN6e-GUpCl_68AEFwpNhEckkFDIq4ANSmv9ICF6EQhTKD5My0a1fgzARzKeFYlHAgidoVNWVeoowK5QIOJWG-a_kXIjUSwQss6eSmHM5Rm8P65ZLxwuv25N8z-35MM793C3xGL3upu4sGcpNk_Bh8XNQVfr-iVeqbps8SVIGBxIaj9FEg9LJWH-af5iazocsMtdN8IP3o-YE6z_7s8Dn6G6_a1-gESCiXoKzuBev3Fb6BfrEaWA |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Concatenated+construction+of+traceability+codes+for+multimedia+fingerprinting&rft.jtitle=Optical+engineering&rft.au=Lin%2C+Yu-Tzu&rft.au=Wu%2C+Ja-Ling&rft.au=Huang%2C+Chun-Hsiang&rft.date=2007-10-01&rft.issn=0091-3286&rft.volume=46&rft.issue=10&rft_id=info:doi/10.1117%2F1.2790911&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0091-3286&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0091-3286&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0091-3286&client=summon |