Authors
Dan Boneh, James Shaw
Publication date
1998/9
Journal
IEEE Transactions on Information Theory
Volume
44
Issue
5
Pages
1897-1905
Publisher
IEEE
Description
This paper discusses methods for assigning code-words for the purpose of fingerprinting digital data, e.g., software, documents, music, and video. Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trace it back to the user. This threat of detection will deter users from releasing unauthorized copies. A problem arises when users collude: for digital data, two different fingerprinted objects can be compared and the differences between them detected. Hence, a set of users can collude to detect the location of the fingerprint. They can then alter the fingerprint to mask their identities. We present a general fingerprinting solution which is secure in the context of collusion. In addition, we discuss methods for distributing fingerprinted data.
Total citations
199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320241012283565689275816892809758625455523729233027213613
Scholar articles
D Boneh, J Shaw - IEEE Transactions on Information Theory, 1998