DocumentCode :
2656063
Title :
Notice of Violation of IEEE Publication Principles
Two-level Tardos fingerprinting code
Author :
Heng Zhang ; Havyarimana, Vincent ; Qiaoliang, Li
Author_Institution :
Dept. of Comput. & Commun., Hunan Univ., Changsha, China
Volume :
3
fYear :
2010
fDate :
17-19 Sept. 2010
Abstract :
Notice of Violation of IEEE Publication Principles

"Two-level Tardos fingerprinting code"
by Heng Zhang, Vincent Havyarimana, and Li Qiaoliang
in the 2010 International Conference on Educational and Information Technology (ICEIT), 2010, pp. V3-353-V3-357

After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.

This paper contains substantial duplication of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:

"On the Systematic Generation of Tardos\´s Fingerprinting Codes"
by Minoru Kuribayashi, Naoyuki Akashi, Masakatu Morii
in the 2008 IEEE 10th Workshop on Multimedia Signal Processing, 2008, pp. 748-753

Digital fingerprinting is an emerging technology that offers proactive post-delivery protection of multimedia. It is used to trace back illegal users, where unique ID known as digital fingerprints is embedded into content before distribution. Tardos proposed binary codes for fingerprinting with a code length of theoretically minimum order, and the related works mainly focused on the reduction of the code length were presented. In this paper, for the reduction of computational costs required for the detection, a two-level Tardos code structure is introduced on the number of operations for calculating correlation scores. Furthermore, using the central limit theorem for correlation scores, we present a proper threshold for detecting colluders. The performance evaluation and analysis show that our proposed scheme is efficient.
Keywords :
binary codes; fingerprint identification; image coding; binary codes; central limit theorem; digital fingerprinting; multimedia; two-level Tardos fingerprinting code; Cryptography; Fingerprint recognition; Integrated circuits; Fingerprinting; Tardos codes; collusion;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Educational and Information Technology (ICEIT), 2010 International Conference on
Conference_Location :
Chongqing
Print_ISBN :
978-1-4244-8033-3
Type :
conf
DOI :
10.1109/ICEIT.2010.5608355
Filename :
5608355
Link To Document :
بازگشت