TY - GEN
T1 - Iterative detection method for CDMA-based fingerprinting scheme
AU - Kuribayashi, Minoru
AU - Morii, Masakatu
PY - 2008
Y1 - 2008
N2 - Digital fingerprinting of multimedia data involves embedding information in the content signal and offers the traceability of illegal users who distribute unauthorized copies. One potential threat to fingerprinting system is collusion, whereby a group of users combines their individual copies in an attempt to remove the underlying fingerprints. Hayashi et. al have proposed hierarchical fingerprinting scheme using the CDMA technique which designed a fingerprint signal by a combination of quasi-orthogonal sequences to increase the allowable number of users. In this paper, we formalize the model of collusion from the viewpoint of a communication channel, and propose a removal operation considering the interference among fingerprints. We also explore the characteristic of the proposed detector and the effects of the removal operation on a detection sequence. By introducing two kinds of thresholds for the determination of the presence of fingerprints, the performance of the proposed detector is enhanced effectively.
AB - Digital fingerprinting of multimedia data involves embedding information in the content signal and offers the traceability of illegal users who distribute unauthorized copies. One potential threat to fingerprinting system is collusion, whereby a group of users combines their individual copies in an attempt to remove the underlying fingerprints. Hayashi et. al have proposed hierarchical fingerprinting scheme using the CDMA technique which designed a fingerprint signal by a combination of quasi-orthogonal sequences to increase the allowable number of users. In this paper, we formalize the model of collusion from the viewpoint of a communication channel, and propose a removal operation considering the interference among fingerprints. We also explore the characteristic of the proposed detector and the effects of the removal operation on a detection sequence. By introducing two kinds of thresholds for the determination of the presence of fingerprints, the performance of the proposed detector is enhanced effectively.
UR - http://www.scopus.com/inward/record.url?scp=57149146149&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=57149146149&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-88961-8_25
DO - 10.1007/978-3-540-88961-8_25
M3 - Conference contribution
AN - SCOPUS:57149146149
SN - 3540889604
SN - 9783540889601
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 357
EP - 371
BT - Information Hiding - 10th International Workshop, IH 2008, Revised Selected Papers
PB - Springer Verlag
T2 - 10th International Workshop on Information Hiding, IH 2008
Y2 - 19 May 2008 through 21 May 2008
ER -