An Asymmetric Fingerprinting Scheme based on Tardos Codes

Ana Charpentier 1 Caroline Fontaine 2, 3 Teddy Furon 4 Ingemar Cox 5
1 TEMICS - Digital image processing, modeling and communication
IRISA - Institut de Recherche en Informatique et Systèmes Aléatoires, Inria Rennes – Bretagne Atlantique
3 Lab-STICC_TB_CID_SFIIS
Lab-STICC - Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (UMR 3192)
4 TEXMEX - Multimedia content-based indexing
IRISA - Institut de Recherche en Informatique et Systèmes Aléatoires, Inria Rennes – Bretagne Atlantique
Abstract : Asymmetric fingerprinting protocols are designed to prevent an untrustworthy Provider incriminating an innocent Buyer. These protocols enable the Buyer to generate their own fingerprint by themself, and ensure that the Provider never has access to the Buyer’s copy of the Work. Until recently, such protocols were not practical because the collusion-resistant codes they rely on were too long. However, the advent of Tardos codes means that the probabilistic collusion-resistant codes are now sufficiently short that asymmetric fingerprint codes should, in theory, be practical. Unfortunately, previous asymmetric fingerprinting protocols cannot be directly applied to Tardos codes, because generation of the Tardos codes depends on a secret vector that is only known to the Provider. This knowledge allows an untrustworthy Provider to attack traditional asymmetric fingerprinting protocols. We describe this attack, and then propose a new asymmetric fingerprinting protocol, specifically designed for Tardos codes.
Type de document :
Communication dans un congrès
Tomáš Filler; Tomáš Pevný; Scott Craver; Andrew Ker. IH'11 - 13th International Conference Information Hiding, May 2011, Prague, Czech Republic. Springer-Verlag, 6958, 2011, LNCS - Lecture Notes in Computer Science. 〈10.1007/978-3-642-24178-9_4〉
Liste complète des métadonnées

https://hal.inria.fr/inria-00581156
Contributeur : Teddy Furon <>
Soumis le : lundi 24 avril 2017 - 11:45:59
Dernière modification le : jeudi 19 juillet 2018 - 12:16:01
Document(s) archivé(s) le : mardi 25 juillet 2017 - 12:11:16

Fichier

Asym_Tardos_gold.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

Citation

Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar Cox. An Asymmetric Fingerprinting Scheme based on Tardos Codes. Tomáš Filler; Tomáš Pevný; Scott Craver; Andrew Ker. IH'11 - 13th International Conference Information Hiding, May 2011, Prague, Czech Republic. Springer-Verlag, 6958, 2011, LNCS - Lecture Notes in Computer Science. 〈10.1007/978-3-642-24178-9_4〉. 〈inria-00581156v2〉

Partager

Métriques

Consultations de la notice

682

Téléchargements de fichiers

54