Interference removal operation for spread spectrum fingerprinting scheme

Research output: Contribution to journalArticle

16 Citations (Scopus)

Abstract

In digital fingerprinting schemes based on the spread spectrum technique, (quasi-)orthogonal sequences are assigned to users as their fingerprints, and they are embedded into digital contents prior to distribution. Owing to the (quasi-) orthogonality, we can uniquely identify the users from a pirated copy, even if dozens of users are involved in the collusion process. Because the number of users accommodated in a fingerprinting system is generally very large, the interference among the sequences involved in a pirated copy becomes non-negligible as the number of colluders increases. In this paper, we investigate the interference from the viewpoint of a communication channel, and we propose an effective removal operation to reduce the interference as far as possible. By iteratively operating the proposed detector, we can sequentially and successively detect colluders from a pirated copy. Furthermore, two kinds of thresholds are introduced in order to perform the removal operation adaptively for detected signals. Experimental results reveal a drastic improvement in the traceability and a reduction in the amount of interference by the removal operation.

Original languageEnglish
Article number6032747
Pages (from-to)403-417
Number of pages15
JournalIEEE Transactions on Information Forensics and Security
Volume7
Issue number2
DOIs
Publication statusPublished - Apr 2012
Externally publishedYes

Fingerprint

Detectors

Keywords

  • CDMA
  • collusion attack
  • fingerprinting
  • iterative detection

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Interference removal operation for spread spectrum fingerprinting scheme. / Kuribayashi, Minoru.

In: IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, 6032747, 04.2012, p. 403-417.

Research output: Contribution to journalArticle

@article{d512427f08024186957b01b9d75f714f,
title = "Interference removal operation for spread spectrum fingerprinting scheme",
abstract = "In digital fingerprinting schemes based on the spread spectrum technique, (quasi-)orthogonal sequences are assigned to users as their fingerprints, and they are embedded into digital contents prior to distribution. Owing to the (quasi-) orthogonality, we can uniquely identify the users from a pirated copy, even if dozens of users are involved in the collusion process. Because the number of users accommodated in a fingerprinting system is generally very large, the interference among the sequences involved in a pirated copy becomes non-negligible as the number of colluders increases. In this paper, we investigate the interference from the viewpoint of a communication channel, and we propose an effective removal operation to reduce the interference as far as possible. By iteratively operating the proposed detector, we can sequentially and successively detect colluders from a pirated copy. Furthermore, two kinds of thresholds are introduced in order to perform the removal operation adaptively for detected signals. Experimental results reveal a drastic improvement in the traceability and a reduction in the amount of interference by the removal operation.",
keywords = "CDMA, collusion attack, fingerprinting, iterative detection",
author = "Minoru Kuribayashi",
year = "2012",
month = "4",
doi = "10.1109/TIFS.2011.2170421",
language = "English",
volume = "7",
pages = "403--417",
journal = "IEEE Transactions on Information Forensics and Security",
issn = "1556-6013",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "2",

}

TY - JOUR

T1 - Interference removal operation for spread spectrum fingerprinting scheme

AU - Kuribayashi, Minoru

PY - 2012/4

Y1 - 2012/4

N2 - In digital fingerprinting schemes based on the spread spectrum technique, (quasi-)orthogonal sequences are assigned to users as their fingerprints, and they are embedded into digital contents prior to distribution. Owing to the (quasi-) orthogonality, we can uniquely identify the users from a pirated copy, even if dozens of users are involved in the collusion process. Because the number of users accommodated in a fingerprinting system is generally very large, the interference among the sequences involved in a pirated copy becomes non-negligible as the number of colluders increases. In this paper, we investigate the interference from the viewpoint of a communication channel, and we propose an effective removal operation to reduce the interference as far as possible. By iteratively operating the proposed detector, we can sequentially and successively detect colluders from a pirated copy. Furthermore, two kinds of thresholds are introduced in order to perform the removal operation adaptively for detected signals. Experimental results reveal a drastic improvement in the traceability and a reduction in the amount of interference by the removal operation.

AB - In digital fingerprinting schemes based on the spread spectrum technique, (quasi-)orthogonal sequences are assigned to users as their fingerprints, and they are embedded into digital contents prior to distribution. Owing to the (quasi-) orthogonality, we can uniquely identify the users from a pirated copy, even if dozens of users are involved in the collusion process. Because the number of users accommodated in a fingerprinting system is generally very large, the interference among the sequences involved in a pirated copy becomes non-negligible as the number of colluders increases. In this paper, we investigate the interference from the viewpoint of a communication channel, and we propose an effective removal operation to reduce the interference as far as possible. By iteratively operating the proposed detector, we can sequentially and successively detect colluders from a pirated copy. Furthermore, two kinds of thresholds are introduced in order to perform the removal operation adaptively for detected signals. Experimental results reveal a drastic improvement in the traceability and a reduction in the amount of interference by the removal operation.

KW - CDMA

KW - collusion attack

KW - fingerprinting

KW - iterative detection

UR - http://www.scopus.com/inward/record.url?scp=84858592056&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84858592056&partnerID=8YFLogxK

U2 - 10.1109/TIFS.2011.2170421

DO - 10.1109/TIFS.2011.2170421

M3 - Article

AN - SCOPUS:84858592056

VL - 7

SP - 403

EP - 417

JO - IEEE Transactions on Information Forensics and Security

JF - IEEE Transactions on Information Forensics and Security

SN - 1556-6013

IS - 2

M1 - 6032747

ER -