Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing
Abstract
:1. Introduction
- Imperceptibility: It is defined as the perceptual similarity between the original and the watermarked versions of the digital content. The embedded watermark must be transparent and must not introduce distortion, which can cause quality degradation.
- Robustness: It is defined as the ability to detect the watermark after common signal processing operations (e.g., cropping, compression, scaling, additive noise, filtering, etc.) A watermark must be robust enough to withstand all kinds of signal processing operations (at least below some distortion threshold).
- Capacity: It is defined as the number of bits a watermark encodes within a unit of time (or space in the case of still images). Capacity is usually given in bits per pixel for images and bits per second for audio.
- Security: It refers to the ability to resist intentional or malicious attacks. A watermarking algorithm must be secure in the sense that an attacker must not be able to detect/extract the existence of embedded data, let alone remove the embedded data. Watermark information should only be accessible to the authorized parties.
- Digital fingerprinting or transaction tracking: In fingerprinting applications, a unique fingerprint (a type of a watermark that identifies the recipient of a multimedia content) is embedded in each individual copy of the content. This application acts as a deterrent to illegal redistribution by enabling the owner of the content to trace the source of the redistributed copy [9,10].
- Content authentication: The goal of this application is to provide assurance that the origin of the content is authentic, and its integrity can be proved. Effective authentication enables the owner to reliably authenticate data and identify possible tampering of the content [11].
- Broadcast monitoring: This application is used to verify the programs broadcasted on TV or radio. It provides cost effective means of monitoring advertisement airtime on TV and radio broadcasts [12].
- Copy control: In copy control applications, the embedded watermark represents a certain copy control or access control policy to prevent intentional or accidental unauthorized copying [13].
- Device control: In this application, watermarks are embedded to control access to a resource using a verifying device, which is equipped with a suitable detector. Depending on the information carried by the watermark, the verifying device can allow or prohibit certain operations on the content [6].
- Legacy enhancement: These applications enhance the functionality of legacy systems while maintaining compatibility with deployed devices.
- Robust watermarking: This type of technique enables the watermarked data to resist a variety of malicious attacks and benign modifications [6]. This technique can be used in copyright protection, fingerprinting, and copy control. However, this watermarking type cannot determine whether the content is tampered or not.
- Fragile watermarking: The watermark in this type is designed to be destroyed at any kind of modification, to detect any illegal manipulation, even slight changes, involving incidental and intentional attacks. It considers the digital content as an entirety and does not allow any tampering. A special class of fragile watermarking, reversible watermarking (also called lossless watermarking) [7,14] enables the recovery of the original (unwatermarked) content after the watermarked content has been identified as authentic. This technique is mainly used in content authentication and integrity verification.
- Semi-fragile watermarking: This type of technique provides robustness against incidental modifications but is fragile against malicious attacks. It is used for content authentication.
- Piracy tracing: The merchant (with or without the collaboration of other parties) is able to identify the source(s) of an illegal redistribution.
- Asymmetry: Only the buyer obtains the fingerprinted version of the content in such a way that no other party can frame an innocent buyer in the case of illegal redistribution [15].
- Anonymity: Transactions and users’ private data are kept anonymous. Under the General Data Protection Regulation (GDPR) introduced by the European Union (EU), personal data of the buyer must be processed in a manner that ensures appropriate security of his/her personal data, including protection against unauthorized or unlawful processing [16]. However, in the case of illegal redistribution, the buyer’s privacy can be revoked by the merchant [17].
- Collusion resistance: The fingerprints are constructed (encoded) in such a way that the collusion of several buyers to delete their fingerprints makes it possible to identify at least one of the traitors [9].
- Dispute resolution: An arbiter should be able to resolve disputes without requiring the buyer to surrender his/her identity or private key.
- Non-repudiation: A buyer accused of redistribution will not be able to claim that the copy was created by the merchant or by a different user.
- Unlinkability: Nobody will be able to determine whether different contents were purchased by the same buyer.
2. Background
- A merchant M is an entity that distributes the copyrighted content to the buyers, either directly or using an auxiliary network of proxies or peers.
- A buyer is an entity that can either play the role of the data requester or the provider in the case of P2P distribution.
- A certification authority is a trusted party that is responsible of issuing certificates to the participants in the fingerprinting protocol (merchant, buyers, peers, proxies, etc.)
- A monitor is a trusted or semi-trusted party that can execute parts of the protocol in such a way that the buyers are protected from a potentially malicious merchant.
- A judge J (or authority) is a trusted party that resolves disputes between M and the buyers , with the cooperation of and if required.
- Cryptography: To protect the contents during transmission, cryptographic algorithms are usually applied. This includes symmetric cryptography (when the encrypting and decrypting keys are identical) and asymmetric or public-key cryptography (when the encrypting and decrypting keys differ). A particularly useful variant of public-key cryptography is homomorphic cryptography. In this case, some operations (such as sums of products, but typically not both) can be carried out over encrypted data in such a way that the result is equivalent to encrypt the result of the operation computed with plaintext data. This makes it possible to make some computations without decrypting the data and, thus, security is maintained until the final decryption is performed.
- Collusion-resistant codes: Since buyers know that their copies of the content are slightly different, a set of malicious buyers (colluders) may try to combine their copies in such a way that the fingerprints are erased and, then, they can distribute the fabricated copy without fearing of being traced. In case of multimedia content, it is reasonable to partition the content into small segments and to embed fingerprint into the segments. If each bit of fingerprint information is inserted into each segment of content, a coalition of users can find differently watermarked segments. Hence, they can modify the embedded fingerprint only at those segments and can select either the ‘0’ or the ‘1’ symbol for each bit of fingerprint. Such an attack—called collusion attack—is essentially unavoidable in a fingerprinting system and the tolerance against the collusion attack is inevitable. Collusion-resistant codes [21] have been designed in such a way that they can identify at least one of the colluders in such scenario.
- Embedding and retrieving (watermarking) algorithms: Two algorithms are required: one to embed the fingerprint into the content and another one to extract a fingerprint from an illegally redistributed content [6]. These two algorithms must fulfill some properties, such as robustness against signal processing operations, transparency, capacity, and security (watermarking keys are required for both embedding and retrieving the fingerprints).
- Traitor tracing: This is an algorithm or a protocol that makes it possible to retrieve the identification that can be linked to at least one buyer involved in illegal redistribution and/or collusion when an unlawful copy of the content is retrieved.
- Auxiliary cryptographic protocols: Well-known cryptographic building blocks, such as zero-knowledge proofs, mix networks, or onion routing, are sometimes used to guarantee some security and privacy properties of these protocols.
- Robustness against signal processing attacks: These include filters, recompression, resizing, resampling, and other operations, either intended or unintended, which may affect or erase the embedded fingerprint.
- Collusion attacks: This is described above.
- De-anonymization attacks: These are attacks intended to break the anonymity of a buyer (this includes frameproof an innocent buyer, linking different purchases to the same buyer, or associating a real identity with a given buyer).
- Communication attacks: These include man-in-the-middle-attack (a malicious party may try to eavesdrop messages exchanged by any two parties in a given protocol) or replay attack (a malicious party may try to collect proofs from another user and reuse them later on as a false authentication to another party).
3. Review of Digital Fingerprinting Schemes for Peer-to-Peer Systems
4. Review of Digital Fingerprinting Schemes for Broadcasting Applications
5. Review of Decentralized Tracing Protocols
6. Analysis and Discussion
- The schemes in [22,24,25,26,27,28,29,30,31] provide revocable privacy. These systems hide the real identity of the buyers that is only revealed by a trusted third party in case of illegal redistribution. On the other hand, the schemes in [34,35,36,37] do not consider buyers’ privacy. In the broadcasting system [47,48], a broadcaster cannot obtain any information about users who receive the broadcasted content unless an illegal redistribution is detected. In this sense, the trusted third party should securely manage the anonymity of users in the system. The systems proposed in [43,44,46] have not addressed users’ privacy concerns.
- The schemes in [22,24,25,26,27,28,29,30,31] also provide mutual anonymity between the users of the distribution system, using pseudonyms, and anonymous authentication and communication techniques. Again, mutual anonymity is not discussed in [34,35,36,37]. On the other hand, the broadcasting system [47,48] offers the anonymity of users, but the users know who broadcasts the content. None of the systems proposed in [43,44,46] provide mutual anonymity.
- Furthermore, in the P2P distribution systems proposed by the authors of [22,24,25,26,27,28,29,30,31], the privacy of the users is preserved against malicious or coalition attacks that attempt to deanonymize the users. Although the systems in [34,35,36,37] provide copyright protection through asymmetric fingerprinting protocols, the privacy of the users is not preserved against any type of malicious attack. Since the private information about users is managed by the trusted third party, the privacy of the users is preserved in the broadcasting system [47,48].
- The schemes in [22,24,25,26,27,28,29,30,31,34,35,36,37] guarantee data protection through the use of different cryptographic solutions (either symmetric, public key or hybrid). Similarly, the data are protected against eavesdropping of broadcast channel because of the enciphering before the broadcasting in [43,44,46,47,48].
- The P2P distribution systems proposed by the authors of [22,24,25,26,27,28,29,30,31,34,35,36,37] guarantee the traceability of copyright violators through either a tracing function of employed collusion-resistant codes or proposed detection/tracing algorithms and/or protocols. The scheme in [47,48] provides the traceability from a user’s decryption keys as well as a pirated copy. It means the fingerprint is insulated into the decryption key. On the other hand, the schemes in [38,39] cannot trace illegal users from a pirated copy. Although the traceability from a pirated copy is possible in [40,41,42], the asymmetric property is not satisfied. The system proposed by Bianchi and Piva [43] detects copyright violators by means of blind decoding, whereas, in the improved version [44], the traceability from a pirated copy is performed through Tardos’s tracing algorithm [21]. Although the system in [46] is based on anti-collusion codes, the traceability mechanism is not provided.
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Flores-Vergara, A.; García-Guerrero, E.E.; Inzunza-González, E.; López-Bonilla, O.R.; Rodríguez-Orozco, E.; Cárdenas-Valdez, J.R.; Tlelo-Cuautle, E. Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic. Nonlinear Dyn. 2019, 96, 497–516. [Google Scholar] [CrossRef]
- García-Guerrero, E.; Inzunza-González, E.; López-Bonilla, O.; Cárdenas-Valdez, J.; Tlelo-Cuautle, E. Randomness improvement of chaotic maps for image encryption in a wireless communication scheme using PIC-microcontroller via Zigbee channels. Chaos Solitons Fractals 2020, 133, 109646. [Google Scholar] [CrossRef]
- Liu, H.; Kadir, A.; Li, Y. Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik 2016, 127, 7431–7438. [Google Scholar] [CrossRef]
- Ballesteros, L.D.M.; Moreno, A.J.M. Speech Scrambling Based on Imitation of a Target Speech Signal with Non-confidential Content. Circuits Syst. Signal Process. 2014, 33, 3475–3498. [Google Scholar] [CrossRef]
- Hamidouche, W.; Farajallah, M.; Sidaty, N.; Assad, S.E.; Deforges, O. Real-time selective video encryption based on the chaos system in scalable HEVC extension. Signal Process. Image Commun. 2017, 58, 73–86. [Google Scholar] [CrossRef]
- Cox, I.; Miller, M.; Bloom, J.; Fridrich, J.; Kalker, T. Digital Watermarking and Steganography, 2nd ed.; Morgan Kaufmann Publishers Inc.: San Francisco, CA, USA, 2007. [Google Scholar]
- Pizzolante, R.; Castiglione, A.; Carpentieri, B.; Santis, A.D.; Castiglione, A. Reversible Copyright Protection for DNA Microarray Images. In Proceedings of the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Krakow, Poland, 4–6 November 2015; pp. 707–712. [Google Scholar] [CrossRef]
- Hou, R.; Xian, H.; Wang, X.; Li, J. A Robust Reversible Watermarking Scheme for Relational Data. In Security and Privacy in New Computing Environments; Li, J., Liu, Z., Peng, H., Eds.; Springer International Publishing: Basel, Switzerland, 2019; pp. 545–550. [Google Scholar] [CrossRef]
- Blakley, G.R.; Meadows, C.; Purdy, G.B. Fingerprinting Long Forgiving Messages. In Advances in Cryptology—CRYPTO ’85 Proceedings; Williams, H.C., Ed.; Springer: Berlin/Heidelberg, Germany, 1986; pp. 180–189. [Google Scholar] [CrossRef] [Green Version]
- Boneh, D.; Shaw, J. Collusion Secure Fingerprinting for Digital Data. IEEE Trans. Inf. Theory 1999, 44, 1897–1905. [Google Scholar] [CrossRef] [Green Version]
- Pizzolante, R.; Castiglione, A.; Carpentieri, B.; Santis, A.D.; Palmieri, F.; Castiglione, A. On the protection of consumer genomic data in the Internet of Living Things. Comput. Secur. 2018, 74, 384–400. [Google Scholar] [CrossRef]
- Walters, T.C.; Ross, D.A.; Lyon, R.F. The Intervalgram: An Audio Feature for Large-Scale Cover-Song Recognition. In From Sounds to Music and Emotions; Aramaki, M., Barthet, M., Kronland-Martinet, R., Ystad, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 197–213. [Google Scholar] [CrossRef]
- Faundez-Zanuy, M.; Hagmüller, M.; Kubin, G. Speaker identification security improvement by means of speech watermarking. Pattern Recognit. 2007, 40, 3027–3034. [Google Scholar] [CrossRef]
- Qiu, Y.; Gu, H.; Sun, J. Reversible watermarking algorithm of vector maps based on ECC. Multimed. Tools Appl. 2018, 77, 23651–23672. [Google Scholar] [CrossRef]
- Pfitzmann, B.; Schunter, M. Asymmetric Fingerprinting. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT’96, Saragossa, Spain, 12–16 May 1996; pp. 84–95. [Google Scholar] [CrossRef] [Green Version]
- Zoethout, T. GDPR: A Fateful Course for Smart Buildings? Elektor. 2019. Available online: https://www.elektormagazine.com/news/gdpr-a-fateful-course-for-smart-buildings (accessed on 3 April 2020).
- Pfitzmann, B.; Waidner, M. Anonymous Fingerprinting. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT’97, Konstanz, Germany, 11–15 May 1997; pp. 88–102. [Google Scholar] [CrossRef] [Green Version]
- Dittmann, J.; Megías, D.; Lang, A.; Herrera-Joancomartí, J. Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity. In Transactions on Data Hiding and Multimedia Security I; Shi, Y.Q., Ed.; Springer: Berlin/Heidelberg, Germany, 2006; pp. 1–40. [Google Scholar] [CrossRef]
- Spotify. 2006. Available online: http://www.spotify.com/ (accessed on 3 April 2020).
- Netflix. 2007. Available online: http://www.netflix.com/ (accessed on 3 April 2020).
- Tardos, G. Optimal Probabilistic Fingerprint Codes. In Proceedings of the 35th Annual ACM Symposium on Theory of Computing, STOC’03, San Diego, CA, USA, 9–11 June 2003; ACM: New York, NY, USA, 2003; pp. 116–125. [Google Scholar] [CrossRef]
- Domingo-Ferrer, J.; Megías, D. Distributed Multicast of Fingerprinted Content Based on a Rational Peer-to-Peer Community. Comput. Commun. 2013, 36, 542–550. [Google Scholar] [CrossRef] [Green Version]
- Domingo-Ferrer, J. Rational Enforcement of Digital Oblivion. In Proceedings of the Fourth International Workshop on Privacy and Anonymity in the Information Society, Uppsala, Sweden, 25 March 2011; pp. 2:1–2:8. [Google Scholar] [CrossRef]
- Qureshi, A.; Megías, D.; Rifà-Pous, H. Secure and Anonymous Multimedia Content Distribution in Peer-to-Peer Networks. In Proceedings of the 6th International Conference on Advances in Multimedia, Nice, France, 23–27 February 2014; pp. 91–96. [Google Scholar]
- Qureshi, A.; Megías, D.; Rifà-Pous, H. Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems. Expert Syst. Appl. 2015, 42, 1391–1408. [Google Scholar] [CrossRef] [Green Version]
- Qureshi, A.; Megías, D.; Rifà-Pous, H. PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting. J. Netw. Comput. Appl. 2016, 66, 180–197. [Google Scholar] [CrossRef] [Green Version]
- Qureshi, A.; Megías, D. Blockchain-based P2P multimedia content distribution using collusion-resistant fingerprinting. In Proceedings of the 11th Asia-Pacific Signal and Information Processing Association (APSIPA) Annual Summit and Conference, Lanzhou, China, 18–21 November 2019; pp. 1606–1615. [Google Scholar] [CrossRef]
- Megías, D.; Domingo-Ferrer, J. Privacy-aware Peer-to-Peer Content Distribution using Automatically Recombined Fingerprints. Multimed. Syst. 2014, 20, 105–125. [Google Scholar] [CrossRef]
- Megías, D.; Domingo-Ferrer, J. DNA-Inspired anonymous Fingerprinting for Efficient Peer-to-Peer Content Distribution. In Proceedings of the IEEE Congress on Evolutionary Computation, 2013, CEC’13, Cancun, Mexico, 20–23 June 2013; 2013; pp. 2376–2383. [Google Scholar] [CrossRef]
- Megías, D. Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints. IEEE Trans. Dependable Sec. Comput. 2015, 12, 179–189. [Google Scholar] [CrossRef] [Green Version]
- Megías, D.; Qureshi, A. Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting. Expert Syst. Appl. 2017, 71, 147–172. [Google Scholar] [CrossRef] [Green Version]
- Nuida, K.; Fujitsu, S.; Hagiwara, M.; Kitagawa, T.; Watanabe, H.; Ogawa, K.; Imai, H. An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths. In Proceedings of the 17th International Conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC’07, Bangalore, India, 16–20 December 2007; Springer: New York, NY, USA, 2007; pp. 80–89. [Google Scholar] [CrossRef]
- Nuida, K.; Fujitu, S.; Hagiwara, M.; Kitagawa, T.; Watanabe, H.; Ogawa, K.; Imai, H. An improvement of discrete Tardos fingerprinting codes. Des. Codes Cryptogr. 2009, 52, 339–362. [Google Scholar] [CrossRef]
- Chen, X.; Lian, S. Research on Secure Digital Content Distribution for Peer to Peer E-commerce Applications. In Proceedings of the International Conference on Multimedia Information Networking and Security, Wuhan, China, 18–20 November 2009; Voume 1, pp. 463–467. [Google Scholar] [CrossRef]
- Hu, D.; Li, Q. Asymmetric fingerprinting based on 1-out-of-n oblivious transfer. IEEE Commun. Lett. 2010, 14, 453–455. [Google Scholar] [CrossRef]
- Gao, H.; Zeng, W.; Chen, Z. Fingerprinting for Copyright Protection in P2P Context. In Proceedings of the International Symposium on Intelligence Information Processing and Trusted Computing, Wuhan, China, 28–29 October 2010; pp. 114–117. [Google Scholar] [CrossRef]
- Terelius, B. Towards transferable watermarks in buyer-seller watermarking protocols. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 18–21 November 2013; pp. 197–202. [Google Scholar] [CrossRef]
- Fiat, A.; Naor, M. Broadcast encryption. In Lecture Notes in Computer Science, Proceedings of the CRYPTO’93, Santa Barbara, CA, USA, 22–26 August 1993; Springer: Heidelberg, Germany, 1993; Volume 773, pp. 480–491. [Google Scholar] [CrossRef] [Green Version]
- Chor, B.; Fiat, A.; Naor, M.; Pinkas, B. Tracing Traitors. IEEE Trans. Inf. Theory 2000, 46, 893–910. [Google Scholar] [CrossRef]
- Fiat, A.; Tassa, T. Dynamic traitor tracing. J. Cryptol. 2001, 14, 211–223. [Google Scholar] [CrossRef]
- Laarhoven, T. Dynamic Tardos traitor tracing schemes. IEEE Trans. Inform. Theory 2013, 59, 4230–4242. [Google Scholar] [CrossRef] [Green Version]
- Naini, R.S.; Wang, Y. Sequential tracing traitors. IEEE Trans. Inform. Theory 2003, 49, 1319–1326. [Google Scholar] [CrossRef]
- Bianchi, T.; Piva, A. TTP-free asymmetric fingerprinting protocol based on client side embedding. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’14), Florence, Italy, 4–9 May 2014; pp. 3987–3991. [Google Scholar] [CrossRef]
- Bianchi, T.; Piva, A.; Shullani, D. Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding. EURASIP J. Inf. Secur. 2015, 6, 1–17. [Google Scholar] [CrossRef] [Green Version]
- Charpentier, A.; Fontaine, C.; Furon, T.; Cox, I. An Asymmetric Fingerprinting Scheme Based on Tardos Codes. In Proceedings of the 13th International Conference on Information Hiding, IH’11, Prague, Czech Republic, 18–20 May 2011; pp. 43–58. [Google Scholar] [CrossRef] [Green Version]
- Lin, C.Y.; Muchtar, K.; Yeh, C.H.; Lu, C.S. Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication. J. Vis. Commun. Image Represent. 2016, 38, 858–871. [Google Scholar] [CrossRef]
- Kuribayashi, M. Fingerprinting for broadcast content distribution system. In Lecture Notes in Computer Science, Proceedings of the International Workshop on Digital Watermarking (IWDW’15), Siena, Italy, 15–17 September 2016; Springer: Heidelberg, Germany, 2016; Volume 9569, pp. 163–175. [Google Scholar] [CrossRef]
- Kuribayashi, M.; Funabiki, N. Fingerprinting for multimedia content broadcasting system. J. Inf. Secur. Appl. 2018, 41, 52–61. [Google Scholar] [CrossRef]
- Kuribayashi, M.; Tanaka, H. Fingerprinting protocol for on-line trade using information gap between buyer and merchant. IEICE Trans. Fundam. 2006, E89-A, 1108–1115. [Google Scholar] [CrossRef]
- Kuribayashi, M.; Funabiki, N. Decentralized tracing protocol for fingerprinting system. APSIPA Trans. Signal Inf. Process. 2019, 8, e2. [Google Scholar] [CrossRef] [Green Version]
- Škorić, B.; Vladimirova, T.U.; Celik, M.; Talstra, J.C. Tardos fingerprinting is better than we thought. IEEE Trans. Inform. Theory 2008, 54, 3663–3676. [Google Scholar] [CrossRef] [Green Version]
- Furon, T.; Guyader, A.; Ce´rou, F. On the design and optimization of Tardos probabilistic fingerprinting codes. In Lecture Notes in Computer Science, Proceedings of the Information Hiding (IH’08), Santa Barbara, CA, USA, 19–21 May 2008; Springer: Heidelberg, Germany, 2008; Volume 5284, pp. 341–356. [Google Scholar] [CrossRef] [Green Version]
- Paillier, P. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT’99, Istanbul, Turkey, 13–17 April 1999; Springer: Heidelberg, Germany, 1999; pp. 223–238. [Google Scholar] [CrossRef] [Green Version]
- Kuribayashi, M.; Funabiki, N. Efficient Decentralized Tracing Protocol for Fingerprinting System with Index Table. In Proceedings of the 11th Asia-Pacific Signal and Information Processing Association (APSIPA) Annual Summit and Conference, Lanzhou, China, 18–21 November 2019; pp. 1595–1601. [Google Scholar] [CrossRef]
- ElGamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 1985, 31, 469–472. [Google Scholar] [CrossRef]
- Sakai, Y.; Emura, K.; Hanaoka, G.; Kawai, Y.; Omote, K. Methods for Restricting Message Space in Public-Key Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2013, E96-A, 1156–1168. [Google Scholar] [CrossRef]
- Furon, T.; Preire, L.P. EM decoding of Tardos traitor tracing codes. In Proceedings of the 11th ACM Workshop on Multimedia and Security, Princeton, NJ, USA, 7–8 September 2009; pp. 99–106. [Google Scholar] [CrossRef] [Green Version]
- Meerwald, P.; Furon, T. Towards practical joint decoding of binary Tardos fingerprinting codes. IEEE Trans. Inform. Forensics Secur. 2012, 7, 1168–1180. [Google Scholar] [CrossRef] [Green Version]
- Desoubeaux, M.; Herzet, C.; Puech, W.; Guelvouit, G.L. Enhanced blind decoding of Tardos codes with new MAP-based functions. In Proceedings of the 15th International Workshop on Multimedia Signal Processing (MMSP), Sardinia, Italy, 30 September–2 October 2013; pp. 283–288. [Google Scholar] [CrossRef]
- Laarhoven, T. Capacities and capacity-achieving decoders for various fingerprinting games. In Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec’14), Salzburg, Austria, 11–13 June 2014; pp. 123–134. [Google Scholar] [CrossRef] [Green Version]
- Oosterwijk, J.J.; Škorić, B.; Doumen, J. A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes. IEEE Trans. Inf. Theory 2015, 61, 3882–3900. [Google Scholar] [CrossRef] [Green Version]
- Kuribayashi, M. Bias equalizer for binary probabilistic fingerprinting codes. In Lecture Notes in Computer Science, Proceedings of the Information Hiding (IH’12), Berkeley, CA, USA, 15–18 May 2012; Springer: Heidelberg, Germany, 2012; Volume 7692, pp. 269–283. [Google Scholar] [CrossRef]
- Kuribayashi, M.; Funabiki, N. Universal scoring function based on bias equalizer for bias-based fingerprinting codes. IEICE Trans. Fundam. 2018, E101-A, 119–128. [Google Scholar] [CrossRef]
- Yasui, T.; Kuribayashi, M.; Funabiki, N.; Echizen, I. Near-optimal detection for binary Tardos code by estimating collusion strategy. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2069–2080. [Google Scholar] [CrossRef]
- Wu, M.; Trappe, W.; Wang, Z.J.; Liu, K.J.R. Collusion resistant fingerprinting for multimedia. IEEE Signal Process. Mag. 2004, 15–27. [Google Scholar] [CrossRef]
Scheme | P2P | Broadcasting | Collusion Resistance | Buyer Frameproofness | Privacy |
---|---|---|---|---|---|
Chen and Lian [34] | Yes (super-node) | Maybe | No | No | No |
Hu and Li [35] | Yes | Maybe | Limited | Yes | No |
Gao et al. [36] | Yes | Maybe | Limited | No | No |
Domingo-Ferrer [23] | Yes (Tree) | No | Yes | Yes | Yes (Revocable) |
Terelius [37] | Yes | No | No | Yes | No |
Domingo-Ferrer and Megías [22] | Yes (Tree) | No | Yes | Yes | Yes (Revocable) |
Megías and Domingo-Ferrer [28,29] | Yes | Maybe | Limited | Yes | Yes (Revocable) |
Megías [30] | Yes | Maybe | Limited | Yes | Yes (Revocable) |
Qureshi et al. [24,25] | Yes (Supl. file) | No | Yes | Yes | Yes (Revocable) |
Bianchi and Piva [43] | No | Yes | No | Yes | No |
Bianchi et al. [44] | No | Yes | Yes | Yes | No |
Kuribayashi [47,48] | No | Yes | Yes | Yes | Yes (Revocable) |
Qureshi et al. [26] | Yes (Supl. file) | Maybe | Yes | Yes | Yes (Revocable) |
Megías and Qureshi [31] | Yes | Maybe | Yes | Yes | Yes (Revocable) |
Qureshi and Megías [27] | Yes | No | Yes | Yes | Yes (Revocable) |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Megías, D.; Kuribayashi, M.; Qureshi, A. Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing. Computers 2020, 9, 26. https://doi.org/10.3390/computers9020026
Megías D, Kuribayashi M, Qureshi A. Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing. Computers. 2020; 9(2):26. https://doi.org/10.3390/computers9020026
Chicago/Turabian StyleMegías, David, Minoru Kuribayashi, and Amna Qureshi. 2020. "Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing" Computers 9, no. 2: 26. https://doi.org/10.3390/computers9020026
APA StyleMegías, D., Kuribayashi, M., & Qureshi, A. (2020). Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing. Computers, 9(2), 26. https://doi.org/10.3390/computers9020026