Iterative detection method for CDMA-based fingerprinting scheme

Minoru Kuribayashi, Masakatu Morii

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Digital fingerprinting of multimedia data involves embedding information in the content signal and offers the traceability of illegal users who distribute unauthorized copies. One potential threat to fingerprinting system is collusion, whereby a group of users combines their individual copies in an attempt to remove the underlying fingerprints. Hayashi et. al have proposed hierarchical fingerprinting scheme using the CDMA technique which designed a fingerprint signal by a combination of quasi-orthogonal sequences to increase the allowable number of users. In this paper, we formalize the model of collusion from the viewpoint of a communication channel, and propose a removal operation considering the interference among fingerprints. We also explore the characteristic of the proposed detector and the effects of the removal operation on a detection sequence. By introducing two kinds of thresholds for the determination of the presence of fingerprints, the performance of the proposed detector is enhanced effectively.

Original languageEnglish
Title of host publicationInformation Hiding - 10th International Workshop, IH 2008, Revised Selected Papers
Pages357-371
Number of pages15
Volume5284 LNCS
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event10th International Workshop on Information Hiding, IH 2008 - Santa Barbara, CA, United States
Duration: May 19 2008May 21 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5284 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other10th International Workshop on Information Hiding, IH 2008
CountryUnited States
CitySanta Barbara, CA
Period5/19/085/21/08

Fingerprint

Iterative Detection
Fingerprinting
Code Division multiple Access
Fingerprint
Code division multiple access
Detectors
Collusion
Detector
Traceability
Communication Channels
Multimedia
Interference

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Kuribayashi, M., & Morii, M. (2008). Iterative detection method for CDMA-based fingerprinting scheme. In Information Hiding - 10th International Workshop, IH 2008, Revised Selected Papers (Vol. 5284 LNCS, pp. 357-371). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5284 LNCS). https://doi.org/10.1007/978-3-540-88961-8-25

Iterative detection method for CDMA-based fingerprinting scheme. / Kuribayashi, Minoru; Morii, Masakatu.

Information Hiding - 10th International Workshop, IH 2008, Revised Selected Papers. Vol. 5284 LNCS 2008. p. 357-371 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5284 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kuribayashi, M & Morii, M 2008, Iterative detection method for CDMA-based fingerprinting scheme. in Information Hiding - 10th International Workshop, IH 2008, Revised Selected Papers. vol. 5284 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5284 LNCS, pp. 357-371, 10th International Workshop on Information Hiding, IH 2008, Santa Barbara, CA, United States, 5/19/08. https://doi.org/10.1007/978-3-540-88961-8-25
Kuribayashi M, Morii M. Iterative detection method for CDMA-based fingerprinting scheme. In Information Hiding - 10th International Workshop, IH 2008, Revised Selected Papers. Vol. 5284 LNCS. 2008. p. 357-371. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-540-88961-8-25
Kuribayashi, Minoru ; Morii, Masakatu. / Iterative detection method for CDMA-based fingerprinting scheme. Information Hiding - 10th International Workshop, IH 2008, Revised Selected Papers. Vol. 5284 LNCS 2008. pp. 357-371 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{bdd9c8d0909b4b7aa1de2b8f96e3a676,
title = "Iterative detection method for CDMA-based fingerprinting scheme",
abstract = "Digital fingerprinting of multimedia data involves embedding information in the content signal and offers the traceability of illegal users who distribute unauthorized copies. One potential threat to fingerprinting system is collusion, whereby a group of users combines their individual copies in an attempt to remove the underlying fingerprints. Hayashi et. al have proposed hierarchical fingerprinting scheme using the CDMA technique which designed a fingerprint signal by a combination of quasi-orthogonal sequences to increase the allowable number of users. In this paper, we formalize the model of collusion from the viewpoint of a communication channel, and propose a removal operation considering the interference among fingerprints. We also explore the characteristic of the proposed detector and the effects of the removal operation on a detection sequence. By introducing two kinds of thresholds for the determination of the presence of fingerprints, the performance of the proposed detector is enhanced effectively.",
author = "Minoru Kuribayashi and Masakatu Morii",
year = "2008",
doi = "10.1007/978-3-540-88961-8-25",
language = "English",
isbn = "3540889604",
volume = "5284 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "357--371",
booktitle = "Information Hiding - 10th International Workshop, IH 2008, Revised Selected Papers",

}

TY - GEN

T1 - Iterative detection method for CDMA-based fingerprinting scheme

AU - Kuribayashi, Minoru

AU - Morii, Masakatu

PY - 2008

Y1 - 2008

N2 - Digital fingerprinting of multimedia data involves embedding information in the content signal and offers the traceability of illegal users who distribute unauthorized copies. One potential threat to fingerprinting system is collusion, whereby a group of users combines their individual copies in an attempt to remove the underlying fingerprints. Hayashi et. al have proposed hierarchical fingerprinting scheme using the CDMA technique which designed a fingerprint signal by a combination of quasi-orthogonal sequences to increase the allowable number of users. In this paper, we formalize the model of collusion from the viewpoint of a communication channel, and propose a removal operation considering the interference among fingerprints. We also explore the characteristic of the proposed detector and the effects of the removal operation on a detection sequence. By introducing two kinds of thresholds for the determination of the presence of fingerprints, the performance of the proposed detector is enhanced effectively.

AB - Digital fingerprinting of multimedia data involves embedding information in the content signal and offers the traceability of illegal users who distribute unauthorized copies. One potential threat to fingerprinting system is collusion, whereby a group of users combines their individual copies in an attempt to remove the underlying fingerprints. Hayashi et. al have proposed hierarchical fingerprinting scheme using the CDMA technique which designed a fingerprint signal by a combination of quasi-orthogonal sequences to increase the allowable number of users. In this paper, we formalize the model of collusion from the viewpoint of a communication channel, and propose a removal operation considering the interference among fingerprints. We also explore the characteristic of the proposed detector and the effects of the removal operation on a detection sequence. By introducing two kinds of thresholds for the determination of the presence of fingerprints, the performance of the proposed detector is enhanced effectively.

UR - http://www.scopus.com/inward/record.url?scp=57149146149&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=57149146149&partnerID=8YFLogxK

U2 - 10.1007/978-3-540-88961-8-25

DO - 10.1007/978-3-540-88961-8-25

M3 - Conference contribution

AN - SCOPUS:57149146149

SN - 3540889604

SN - 9783540889601

VL - 5284 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 357

EP - 371

BT - Information Hiding - 10th International Workshop, IH 2008, Revised Selected Papers

ER -