Skip to main content
Erschienen in: Designs, Codes and Cryptography 2/2016

01.05.2016

Strongly separable codes

verfasst von: Jing Jiang, Minquan Cheng, Ying Miao

Erschienen in: Designs, Codes and Cryptography | Ausgabe 2/2016

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Binary \(t\)-frameproof codes (\(t\)-FPCs) are used in multimedia fingerprinting schemes where the identification of authorized users taking part in the averaging collusion attack is required. In this paper, a binary strongly \(\overline{t}\)-separable code (\(\overline{t}\)-SSC) is introduced to improve such a scheme based on a binary \(t\)-FPC. A binary \(\overline{t}\)-SSC has the same traceability as a binary \(t\)-FPC but has more codewords than a binary \(t\)-FPC. A composition construction for binary \(\overline{t}\)-SSCs from \(q\)-ary \(\overline{t}\)-SSCs is described, which stimulates the research on \(q\)-ary \(\overline{t}\)-SSCs with short length. Several infinite series of optimal \(q\)-ary \(\overline{2}\)-SSCs of length \(2\) are derived from the fact that a \(q\)-ary \(\overline{2}\)-SSC of length \(2\) is equivalent to a \(q\)-ary \(\overline{2}\)-separable code of length \(2\). Combinatorial properties of \(q\)-ary \(\overline{2}\)-SSCs of length \(3\) are investigated, and a construction for \(q\)-ary \(\overline{2}\)-SSCs of length \(3\) is provided. These \(\overline{2}\)-SSCs of length \(3\) have more than \(12.5\,\%\) codewords than \(2\)-FPCs of length \(3\) could have.
Literatur
1.
Zurück zum Zitat Alon N., Cohen G., Krivelevich M., Litsyn S.: Generalized hashing and parent-identifying codes. J. Comb. Theory Ser. A 104, 207–215 (2003). Alon N., Cohen G., Krivelevich M., Litsyn S.: Generalized hashing and parent-identifying codes. J. Comb. Theory Ser. A 104, 207–215 (2003).
2.
Zurück zum Zitat Bazrafshan M., van Trung T.: On optimal bounds for separating hash families. Presented at the Germany Africa Workshop on Information and Communication Technology, Essen, Germany (2008). Bazrafshan M., van Trung T.: On optimal bounds for separating hash families. Presented at the Germany Africa Workshop on Information and Communication Technology, Essen, Germany (2008).
3.
Zurück zum Zitat Blackburn S.R.: Frameproof codes. SIAM J. Discret. Math. 16, 499–510 (2003). Blackburn S.R.: Frameproof codes. SIAM J. Discret. Math. 16, 499–510 (2003).
4.
Zurück zum Zitat Boneh D., Shaw J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44, 1897–1905 (1998). Boneh D., Shaw J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44, 1897–1905 (1998).
5.
Zurück zum Zitat Cheng M., Miao Y.: On anti-collusion codes and detection algorithms for multimedia fingerprinting. IEEE Trans. Inf. Theory 57, 4843–4851 (2011). Cheng M., Miao Y.: On anti-collusion codes and detection algorithms for multimedia fingerprinting. IEEE Trans. Inf. Theory 57, 4843–4851 (2011).
6.
Zurück zum Zitat Cheng M., Ji L., Miao Y.: Separable codes. IEEE Trans. Inf. Theory 58, 1791–1803 (2012). Cheng M., Ji L., Miao Y.: Separable codes. IEEE Trans. Inf. Theory 58, 1791–1803 (2012).
7.
Zurück zum Zitat Cheng M., Fu H.-L., Jiang J., Lo Y.-H., Miao Y.: New bounds on \(\overline{2}\)-separable codes of length 2. Des. Codes Cryptogr. 74, 31–40 (2015). Cheng M., Fu H.-L., Jiang J., Lo Y.-H., Miao Y.: New bounds on \(\overline{2}\)-separable codes of length 2. Des. Codes Cryptogr. 74, 31–40 (2015).
8.
Zurück zum Zitat Cox I.J., Kilian J., Leighton F.T., Shamoon T.G.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673–1687 (1997). Cox I.J., Kilian J., Leighton F.T., Shamoon T.G.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673–1687 (1997).
9.
Zurück zum Zitat Gao F., Ge G.: New bounds on separable codes for multimedia fingerprinting. IEEE Trans. Inf. Theory 60, 5257–5262 (2014). Gao F., Ge G.: New bounds on separable codes for multimedia fingerprinting. IEEE Trans. Inf. Theory 60, 5257–5262 (2014).
10.
Zurück zum Zitat Liu K.J.R., Trappe W., Wang Z.J., Wu M., Zhao H.: Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation, New York (2005). Liu K.J.R., Trappe W., Wang Z.J., Wu M., Zhao H.: Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation, New York (2005).
11.
Zurück zum Zitat MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977). MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977).
12.
Zurück zum Zitat Podilchuk C.I., Zeng W.: Image-adaptive watermarking using visual models. IEEE J. Sel. Areas Commun. 16, 525–539 (1998). Podilchuk C.I., Zeng W.: Image-adaptive watermarking using visual models. IEEE J. Sel. Areas Commun. 16, 525–539 (1998).
13.
Zurück zum Zitat Stinson D.R., van Trung T., Wei R.: Secure frameproof codes, key distribution pattern, group testing algorithms and related structures. J. Stat. Plan. Infer. 86, 595–617 (2000). Stinson D.R., van Trung T., Wei R.: Secure frameproof codes, key distribution pattern, group testing algorithms and related structures. J. Stat. Plan. Infer. 86, 595–617 (2000).
14.
Zurück zum Zitat Trappe W., Wu M., Wang Z.J., Liu K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Sig. Process. 51, 1069–1087 (2003). Trappe W., Wu M., Wang Z.J., Liu K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Sig. Process. 51, 1069–1087 (2003).
Metadaten
Titel
Strongly separable codes
verfasst von
Jing Jiang
Minquan Cheng
Ying Miao
Publikationsdatum
01.05.2016
Verlag
Springer US
Erschienen in
Designs, Codes and Cryptography / Ausgabe 2/2016
Print ISSN: 0925-1022
Elektronische ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-015-0050-1

Weitere Artikel der Ausgabe 2/2016

Designs, Codes and Cryptography 2/2016 Zur Ausgabe

Premium Partner