Traitor tracing for shortened and corrupted fingerprints

18Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We consider tracing fingerprinted media data such as images and video data. We consider pirate objects that are constructed by a group of up to c colluders who have used a range of attacks including 'cut and paste', averaging (to weaken the embedded marks), and cropping (to remove part of the fingerprint). We have two main results: First, we give an efficient algorithm for tracing shortened fingerprints that are obtained from a class of generalized Reed-Solomon codes. Second, we propose combined mark detection and tracing using soft-decision decoding and show that it gives a more powerful tracing algorithm. We conclude the paper by discussing our results and giving possible directions for future research. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Safavi-Naini, R., & Wang, Y. (2003). Traitor tracing for shortened and corrupted fingerprints. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2696, 81–100. https://doi.org/10.1007/978-3-540-44993-5_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free