Font Size: a A A

Digital Fingerprint Based On Error-correcting Codes

Posted on:2007-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y HeFull Text:PDF
GTID:2208360185971869Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, there is much more information distribution. We take great advantages of Internet, but illegally copying and distributing, which might lead to financial loss or legal problems of the producers puzzle us. How to protect the authors' intellectual property rights is an urgent problem which need to be solved. Digital fingerprinting has been proved to be the most effective way for copyright protection.Digital fingerprinting is a technique for identifying unauthorized copy and tracing back to its user. Fingerprinting consists of unique marking and registering each copy of data. Now, digital fingerprinting has appeared as a new technique for copyright protection of digital contents. A problem arises when users collude: for digital data, different fingerprinted copies can be compared and the differences between them detected. Hence, a set of users can collude to detect the location of the fingerprint. They can then alter the fingerprint to mask their identities. How to defense collusive attack is the key problems for the designing of fingerprinting. The main contents of the paper are as follows:1. Introducing the development and states of information hiding and digital fingerprinting, expatiates the relation of the cryptography, digital fingerprinting and information hiding.2. Introducing the conception of digital fingerprinting briefly, explain the terms in common use, summarize the existing results of the research, analyze the strong points and shortcomings of these kinds of traitor tracing schemes.3. Bringing forward equidistant codes' new structure, analyzing the structure.4. Discussing a new method for assigning error-correcting code for the purpose of fingerprinting digital data. Furthermore, the performance of this scheme is analyzed.5. Analyzing the scheme's performance, compare the scheme with Bone and Shaw', point out the scheme' advantage and shortcoming.
Keywords/Search Tags:copyright protection, fingerprinting, the Viterbi Algorithm, error-correcting code
PDF Full Text Request
Related items