Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

Analysis of Boneh-Shaw Finger Printing Codes under Majority Value Collusion Attacks

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Alok Tripathi, Rajiv Pandey
10.5120/ijca2017914195

Alok Tripathi and Rajiv Pandey. Analysis of Boneh-Shaw Finger Printing Codes under Majority Value Collusion Attacks. International Journal of Computer Applications 167(3):1-7, June 2017. BibTeX

@article{10.5120/ijca2017914195,
	author = {Alok Tripathi and Rajiv Pandey},
	title = {Analysis of Boneh-Shaw Finger Printing Codes under Majority Value Collusion Attacks},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {167},
	number = {3},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {1-7},
	numpages = {7},
	url = {http://www.ijcaonline.org/archives/volume167/number3/27748-2017914195},
	doi = {10.5120/ijca2017914195},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Lot of research has been done in the previous years to deal with threat of collusion attacks on finger printing codes. Digital fingerprints are code inserted in the media contents before distribution. Each fingerprinting code is assigned to an intended recipient. This fingerprinting code is used to track the culprit in case of illegal distribution of media contents by users. It is now possible for a group of users with different printing codes of the same content to collude together and collectively mount attack against fingerprints. Thus collusion attack poses a real challenge to protect the copyright of digital media. This paper presents an analysis of Boneh-Shaw finger printing codes under Majority Value collusion attacks.

References

  1. S Sahar Afshan Andrabi, Sheenam. A Review: Information Hiding Using Watermarking Techniques. SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE) – EFES April 2015.
  2. V A. Sudha, K. Vanitha, A. NooralShaba. Efficient Analysis And Secure Client Side Image Using Fingerprint Embedding International Journal of Scientific & technology Research Volume 3, Issue 1, January 2014 ISSN 2277-8616.
  3. Sharbani Bhattacharya et al. Survey on Digital Watermarking – A Digital Forensics & Security Application International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 11, November 2014.
  4. Kusuma Kumari A Survey of Digital Watermarking Techniques and it Applications Karnataka, India International Journal of Science and Research (IJSR)ISSN (Online): 2319-7064 Volume 2 Issue 12, December 2013.
  5. Miss. Nupoor M. Yawale1, Prof. V. B. Gadicha2. Digital Watermarking and fingerprinting:A good idea for security. International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 2, Issue 2, February 2013 ISSN 2319 – 4847.
  6. Gurpreet Kaur, Kamaljeet Kaur Digital Watermarking and Other Data Hiding Techniques International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-5, April 2013.
  7. Marcel Schäfer, Waldemar Berchtold, Margareta Heilmann, Sascha Zmudzinski, Martin Steinebach, Stefan Katzenbeisser. Collusion Secure Fingerprint Watermarking for Real World Applications Proc. of GI-Sicherheit 2010.
  8. Satoshi Fujitsu. Fingerprinting. Broadcasting Systems. Series: Challenges: "Information Security Technology in the Digital ... Broadcast Technology No.36, Spring 2009. NHK STRL. C. 21. Challenge. CAS technology overview. Broadcasting.
  9. Shan He and Min Wu. Collusion-Resistant Video Fingerprinting for Large User Group. IEEE Transactions on Information Forensics and Security, Vol. 2, No. 4, December 2007.
  10. Hans Georg Schaathun. The Boneh–Shaw Fingerprinting Scheme is Better Than We Thought. IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, JUNE 2006.
  11. Schaathun, H.G. . On watermarking/fingerprinting for copyright protection. Proceedings of the 1st International Conference on Innovative Computing, Information and Control, Volume 3, August 30-September 1, 2006, Beijing, China, pp: 50-53.
  12. Miguel Soriano, Marcel Fernandez, Elisa Sayrol, Joan Tomas,Joan Casanellas,Josep Pegueroles, and Juan Hernández-Serrano. Multimedia Copyright Protection Platform Demonstrator. P. Herrmann et al. (Eds.): iTrust 2005, LNCS 3477, pp. 411-414, 2005.
  13. Hans Georg Schaathun. Fighting two pirates. Chapter Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Volume 2643 of the series Lecture Notes in Computer Science pp 71-78, April 2003.
  14. Chris Peikert abhi shelat Adam Smith. Lower Bounds for Collusion-Secure Fingerprinting. Proceeding SODA '03 Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms Pages 472-479,2003.
  15. Francesc Seb´e and Josep Domingo-Ferrer. Short 3-Secure Fingerprinting Codes for Copyright Protection.Chapter Information Security and Privacy Volume 2384 of the series Lecture Notes in Computer Science pp 316-327 , 2002.
  16. Gérard Cohen, Simon Litsyn, Gilles Zémor. Binary Codes for Collusion-Secure Fingerprinting Inforrmation Security and Cryptology — ICISC 2001Volume 2288 of the series Lecture Notes in Computer Science pp 178-185 Date: 23 April 2002.
  17. J. Domingo-Ferrer and J. Herrera-Joancomarti. Short collusion-secure fingerprints based on dual binary Hamming codes. Electronics Letters 28th September 2000 Vol. 36 No. 20.
  18. Dan Boneh and James Shaw .Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory, Vol. 44, N0. 5, September 1998.
  19. Content Control: Digital Watermarking and Fingerprinting by Dominic Milano Rhozet http://www.carbonserver.com/whitepapers/Fingerprinting_Watermarking.pdf.
  20. Steganography And Digital Watermark http://www.gnu.org/copyleft/fdl.html

Keywords

Digital Water Marking, Digital Fingerprinting, Collusion Attack, Boneh-Shaw Finger printing Codes