Font Size: a A A

Research On High Efficient IPP Code Based On Concatenating Technology

Posted on:2007-03-10Degree:MasterType:Thesis
Country:ChinaCandidate:N LiFull Text:PDF
GTID:2178360182980819Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Fingerprinting digital material is an effective means of protecting copyrighted material and digital rights management. The distributor marks each copy of the digital objects with a unique codeword and then ships it. This marking allows the distributor to detect any unauthorized copy and trace it back to its user. Since a marked object can be traced back to the owners, users will be deterred from releasing an unauthorized copy.Chapter 1 introduces the development of the information hiding technique. In Chapter 2 and Chapter 3, we present some premilinaries, namely fingerprinting system, Traceability schemes and IPP code.The fingerprint can identify the pirate who made the very illegal copy. However, a coalition of users may detect the marks by comparing multiple fingerprinted objects and modify or erase them.In this process, pirates may futher try to frame the innocents. To prevent this, distributors may embed codes with traciblilty to the digital material to find at least one user involving in the pirate act. Identifiable Parent Property (IPP) codes, exactly for this purpose, can identify at least one parent of the pirate codeword.In Chapter 4, we discribe a construction for non-binary IPP codes from Traceability schemes by means of concatenating technique and discuss the pirate tracing mechanism in the presence of erasures. In our construction, the inner code is GOSSIP code (that has a tracing algorithm) and the outer code is an IPP-code constructed by RS code. So the Concatenated code also traces back the members of the pirate group. Further, we show that these codes can withstand erasures in Digital Fingerprinting applications and come up with a deterministic tracing algorithm that can identify all the users who participated in creating the pirate codeword. Besides, by choosing a suitable and deterministic Gossip code as inner code, our construction attains the satisfiable code length. In Chapter 5 we simulate the fingerprinting system on VC++ 6.0 platform to demonstrate the application of our concatenated code in the whole process The results show the priority on anti-collusion property.
Keywords/Search Tags:Identifiable parent property (IPP) code, Traceability (TA) code, Concatenated code, Collusion.
PDF Full Text Request
Related items