{"title":"一种可扩展的指纹识别方案,用于在大规模内容分发环境中跟踪叛徒/共谋者","authors":"Jae-Min Seol, Seong-Whan Kim","doi":"10.1109/ISDA.2005.14","DOIUrl":null,"url":null,"abstract":"Fingerprinting schemes use digital watermarks to determine originators of unauthorized/pirated copies. Multiple users may collude and collectively escape identification by creating an average or median of their individually watermarked copies. We present a scalable codebook generation scheme to increase the number of fingerprinted users. We extended the ACC (anti-collusion code) scheme using a Gaussian distributed random variable for medium attack robustness. We experimented with our scheme using human visual system based watermarking scheme, and the simulation results with standard test images show good collusion detection performance over average and median collusion attacks.","PeriodicalId":345842,"journal":{"name":"5th International Conference on Intelligent Systems Design and Applications (ISDA'05)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A scalable fingerprinting scheme for tracing traitors/colluders in large scale contents distribution environments\",\"authors\":\"Jae-Min Seol, Seong-Whan Kim\",\"doi\":\"10.1109/ISDA.2005.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fingerprinting schemes use digital watermarks to determine originators of unauthorized/pirated copies. Multiple users may collude and collectively escape identification by creating an average or median of their individually watermarked copies. We present a scalable codebook generation scheme to increase the number of fingerprinted users. We extended the ACC (anti-collusion code) scheme using a Gaussian distributed random variable for medium attack robustness. We experimented with our scheme using human visual system based watermarking scheme, and the simulation results with standard test images show good collusion detection performance over average and median collusion attacks.\",\"PeriodicalId\":345842,\"journal\":{\"name\":\"5th International Conference on Intelligent Systems Design and Applications (ISDA'05)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"5th International Conference on Intelligent Systems Design and Applications (ISDA'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDA.2005.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th International Conference on Intelligent Systems Design and Applications (ISDA'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDA.2005.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A scalable fingerprinting scheme for tracing traitors/colluders in large scale contents distribution environments
Fingerprinting schemes use digital watermarks to determine originators of unauthorized/pirated copies. Multiple users may collude and collectively escape identification by creating an average or median of their individually watermarked copies. We present a scalable codebook generation scheme to increase the number of fingerprinted users. We extended the ACC (anti-collusion code) scheme using a Gaussian distributed random variable for medium attack robustness. We experimented with our scheme using human visual system based watermarking scheme, and the simulation results with standard test images show good collusion detection performance over average and median collusion attacks.