We propose a q-ary fingerprinting system for stored digital objects such as images, videos and audio clips. A fingerprint is a q-ary sequence. The object is divided into blocks and each symbol of the fingerprint is embedded into one block. Colluders
construct a pirate object by assembling parts from their copies. They can also erase some of the marks or cut out part ofthe object resulting in a shortened fingerprint with some unreadable marks. We give constructions of codes that can identifyone of the colluders once a pirate object is found.
%0 Journal Article
%1 keyhere
%A Safavi-Naini, Reihaneh
%A Wang, Yejing
%D 2002
%J Security and Privacy in Digital Rights Management
%K code fingerprinting
%P 57--75
%T Collusion Secure
%U http://dx.doi.org/10.1007/3-540-47870-1_5
%X We propose a q-ary fingerprinting system for stored digital objects such as images, videos and audio clips. A fingerprint is a q-ary sequence. The object is divided into blocks and each symbol of the fingerprint is embedded into one block. Colluders
construct a pirate object by assembling parts from their copies. They can also erase some of the marks or cut out part ofthe object resulting in a shortened fingerprint with some unreadable marks. We give constructions of codes that can identifyone of the colluders once a pirate object is found.
@article{keyhere,
abstract = {We propose a q-ary fingerprinting system for stored digital objects such as images, videos and audio clips. A fingerprint is a q-ary sequence. The object is divided into blocks and each symbol of the fingerprint is embedded into one block. Colluders
construct a pirate object by assembling parts from their copies. They can also erase some of the marks or cut out part ofthe object resulting in a shortened fingerprint with some unreadable marks. We give constructions of codes that can identifyone of the colluders once a pirate object is found.},
added-at = {2009-04-24T22:06:46.000+0200},
author = {Safavi-Naini, Reihaneh and Wang, Yejing},
biburl = {https://www.bibsonomy.org/bibtex/2afa5464749234448e2e63406237441dc/ywhuang},
description = {SpringerLink - Book Chapter},
interhash = {083ce124657124043adb6d2fd09035d9},
intrahash = {afa5464749234448e2e63406237441dc},
journal = {Security and Privacy in Digital Rights Management},
keywords = {code fingerprinting},
pages = {57--75},
timestamp = {2009-04-24T22:06:46.000+0200},
title = {Collusion Secure},
url = {http://dx.doi.org/10.1007/3-540-47870-1_5},
year = 2002
}