Paper
9 February 2012 Ranking search for probabilistic fingerprinting codes
Author Affiliations +
Proceedings Volume 8303, Media Watermarking, Security, and Forensics 2012; 830306 (2012) https://doi.org/10.1117/12.908352
Event: IS&T/SPIE Electronic Imaging, 2012, Burlingame, California, United States
Abstract
Digital transaction watermarking today is a widely accepted mechanism to discourage illegal distribution of multimedia. The transaction watermark is a user-specific message that is embedded in all copies of one content and thus makes it individual. Therewith it allows to trace back copyright infringements. One major threat on transaction watermarking are collusion attacks. Here, multiple individualized copies of the work are compared and/or combined to attack the integrity or availability of the embedded watermark message. One solution to counter such attacks are mathematical codes called collusion secure fingerprinting codes. Problems arise when applying such codes to multimedia files with small payload, e.g. short audio tracks or images. Therefore the code length has to be shortened which increases the error rates and/or the effort of the tracing algorithm. In this work we propose an approach whether to use as an addition to probabilistic fingerprinting codes for a reduction of the effort and increment of security, as well as a new separate method providing shorter codes at a very fast and high accurate tracing algorithm.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Marcel Schäfer, Waldemar Berchtold, and Martin Steinebach "Ranking search for probabilistic fingerprinting codes", Proc. SPIE 8303, Media Watermarking, Security, and Forensics 2012, 830306 (9 February 2012); https://doi.org/10.1117/12.908352
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Detection and tracking algorithms

Multimedia

Forensic science

Current controlled current source

Electronic imaging

Information security

RELATED CONTENT

Co-occurrence steganalysis in high dimensions
Proceedings of SPIE (February 09 2012)
Capacity-optimized mp2 audio watermarking
Proceedings of SPIE (June 20 2003)
Forensic audio watermark detection
Proceedings of SPIE (February 13 2012)
Embedding considering dependencies between pixels
Proceedings of SPIE (March 18 2008)

Back to Top