Abstract
Since the introduction of turbo codes in 1993, many new applications for this family of codes have been proposed. One of the latest, in the context of digital fingerprinting, is called turbo fingerprinting codes and was proposed by Zhang et al.. The main idea is a new fingerprinting code composed of an outer turbo code and an inner code based on the Boneh-Shaw model. The major contribution of this paper is a new analysis of this new family of codes that shows its drawbacks. These drawbacks must be considered in order to perform a correct design of a turbo fingerprinting scheme otherwise the scheme cannot retrieve the traitor users which is the main goal of digital fingerprinting scheme. Moreover, the identification of these drawbacks allows to discuss an entirely new construction of fingerprinting codes based on turbo codes.
Chapter PDF
Similar content being viewed by others
References
Wagner, N.R.: Fingerprinting. In: SP 1983: Proceedings of the, IEEE Symposium on Security and Privacy, Washington, DC, USA, p. 18. IEEE Computer Society, Los Alamitos (1983)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data (extended abstract). In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Barg, A., Blakley, G.R., Kabatiansky, G.A.: Digital fingerprinting codes: problem statements, constructions, identification of traitors. IEEE Transactions on Information Theory 49(4), 852–865 (2003)
Fernandez, M., Soriano, M.: Fingerprinting concatenated codes with efficient identification. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 459–470. Springer, Heidelberg (2002)
Zhu, Y., Zou, W., Zhu, X.: Collusion secure convolutional fingerprinting information codes. In: ASIACCS 2006: Proceedings of the, ACM Symposium on Information, computer and communications security, pp. 266–274. ACM Press, New York (2006)
Tomàs-Buliart, J., Fernandez, M., Soriano, M.: Improvement of collusion secure convolutional fingerprinting information codes. In: Proceedings of International Conference on Information Theoretic Security (ICITS 2007) (2007)
Zhang, Z., Chen, X., Zhou, M.: A digital fingerprint coding based on turbo codes. In: International Conference on Computational Intelligence and Security, 2007, pp. 897–901 (2007)
Hamming, R.W.: Error detecting and error correcting codes. Bell System Techincal Journal 29, 147–160 (1950)
Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing traitors. IEEE Transactions on Information Theory 46(3), 893–910 (2000)
Berrou, C., Glavieux, A.: Near optimum error correcting coding and decoding: turbo-codes. IEEE Transactions on Communications 44(10), 1261–1271 (1996)
Berrou, C., Glavieux, A., Thitimajshima, P.: Near shannon limit error-correcting coding and decoding: Turbo-codes. 1. In: IEEE International Conference on Communications, 1993. ICC 1993. Geneva. Technical Program, Conference Record, May 23-26, 1993, vol. 2, pp. 1064–1070 (1993)
Hagenauer, J., Hoeher, P.: A viterbi algorithm with soft-decision outputs and its applications. In: Global Telecommunications Conference, 1989, and Exhibition. Communications Technology for the 1990s and Beyond. GLOBECOM 1989, November 27-30, 1989, vol. 3, pp. 1680–1686. IEEE, Los Alamitos (1989)
Hagenauer, J., Papke, L.: Decoding turbo-codes with the soft output viterbi algorithm (sova). In: Proceedings of the IEEE International Symposium on Information Theory (June 27–July 1, 1994), p. 164 (1994)
Bahl, L., Cocke, J., Jelinek, F., Raviv, J.: Optimal decoding of linear codes for minimizing symbol error rate (corresp.). IEEE Transactions on Information Theory 20(2), 284–287 (1974)
Lin, S., Costello, D.J.: Error Control Coding, 2nd edn. Prentice-Hall, Inc., Upper Saddle River (2004)
Vucetic, B., Yuan, J.: Turbo codes: principles and applications. Kluwer Academic Publishers, Norwell (2000)
Navau, J.C., Fernandez, M., Soriano, M.: A family of collusion 2-secure codes. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 387–397. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tomàs-Buliart, J., Fernández, M., Soriano, M. (2008). New Considerations about the Correct Design of Turbo Fingerprinting Codes. In: Jajodia, S., Lopez, J. (eds) Computer Security - ESORICS 2008. ESORICS 2008. Lecture Notes in Computer Science, vol 5283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88313-5_32
Download citation
DOI: https://doi.org/10.1007/978-3-540-88313-5_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88312-8
Online ISBN: 978-3-540-88313-5
eBook Packages: Computer ScienceComputer Science (R0)