By Topic

Efficient identification of traitors in fingerprinted multimedia contents

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Fernandez, M. ; Dept. d''Enginyeria Telematica, Univ. Politecnica de Catalunya, Barcelona, Spain ; Soriano, M.

In a fingerprinting scheme a different set of marks is embedded in each copy of a digital object, in order to deter illegal redistribution. A group of dishonest users, called traitors, collude to create a pirate copy that hides their identities, by putting together different parts of their copies. If the sets to be embedded are the codewords of an error correcting code then efficient algorithms can be used to trace the guilty. In this paper we present a tracing algorithm that, by taking advantage of soft-decision decoding techniques, finds all possible identifiable traitors.

Published in:

Database and Expert Systems Applications, 2002. Proceedings. 13th International Workshop on

Date of Conference:

2-6 Sept. 2002