Methods and systems for fingerprinting digital data

Image analysis – Applications

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S201000, C380S252000

Reexamination Certificate

active

06754364

ABSTRACT:

TECHNICAL FIELD
This invention pertains to methods and systems for fingerprinting digital data.
BACKGROUND
Fingerprinting is a technique that involves uniquely marking each copy of a particular object, and associating each uniquely marked copy with a particular entity to which the copy is distributed. If unauthorized copies of the uniquely marked copy are made, the fingerprint can be traced back to the original entity to which the copy was initially distributed.
As an example, consider a printed map. When a map maker produces a map, they may want to ensure that those individuals to whom the map is distributed do not make unauthorized copies of the map and distribute them to others. One way that the map maker might protect his maps is to introduce a different trivial error, or fingerprint, (e.g. a non-existent street) into each of the copies of the map that are distributed. Each fingerprint is then associated with an individual to whom the map is to be distributed. By associating each different fingerprint with a different individual, if and when unauthorized copies of that individual's copy are uncovered, they can be traced back to the original individual by virtue of the unique fingerprint that the map contains.
One problem with this type of fingerprinting can arise when two or more individuals collude for the purpose of discovering their fingerprints. That is, when two or more individuals get together and compare their maps, they can, given enough time, ascertain their unique fingerprints by simply looking for the differences between their maps. If they can ascertain their fingerprint, they can alter it and therefore possibly avoid detection.
In contemporary times, particularly with the advent of the Internet and electronic distribution, fingerprinting digital data (e.g. software, documents, music, and video) for purposes of detecting or deterring unauthorized copying has become particularly important. As in the above map example, collusion by different individuals in the digital context can pose challenges to the owners and distributors of such digital data. Although progress has been made in the area of digital fingerprinting, further strides are necessary to increase the breadth of protection that is afforded by digital fingerprinting. For example, in one fingerprinting system (the “Boneh-Shaw system” discussed in more detail below), some protection against collusion is provided, but only when the number of colluders is relatively small. Thus, there is a need to increase the protection that is provided by digital fingerprinting to provide detection of colluders even when the number of colluders is large.
Accordingly, this invention arose out of concerns associated with providing improved methods and systems for fingerprinting digital data.
SUMMARY
Methods and systems for fingerprinting digital data are described. In the described embodiment, Direct Sequence Spread Spectrum (DSSS) technology is utilized. Unique fingerprinting words are defined where each includes at least one spread sequence. In the described embodiment, a fingerprinting word comprises a plurality symbols, called “&Ggr; symbols.” Each &Ggr; symbol is composed of 2c-1 blocks, where c represents the number of colluders that are desired to be protected against. Each block contains d spread sequence chips. The fingerprinting words are assigned to a plurality of entities to which protected objects embedded with the fingerprinting words are to be distributed.
To ascertain the identity of an entity that has altered its unique fingerprinting word, the relative weight of each block is computed in accordance with a defined function and blocks whose weights satisfy a predetermined relationship are “clipped” to a so-called working range. Each &Ggr;-symbol of the altered fingerprinting word is then processed to produce a set of one or more “colors” that might be the subject of a collusion. Each &Ggr;-symbol in the fingerprinting word for each entity is then evaluated against a corresponding produced set and the entity having the most overall incriminating “colors” is incriminated.


REFERENCES:
patent: 5930369 (1999-07-01), Cox et al.
patent: 6064764 (2000-05-01), Bhaskaran et al.
patent: 6345100 (2002-02-01), Levine
patent: 6345104 (2002-02-01), Rhoads
patent: 2002/0191809 (2002-12-01), Kirovski et al.
patent: 0951183 (1999-10-01), None
patent: WO 97/34391 (1997-09-01), None
Collusion-secure fingerprinting for digital data Boneh, D.; Shaw, J. Information Theory, IEEE Transactions on , vol.: 44 Issue: 5 , Sep. 1998 Pages(s): 1897-1905.*
Digital watermarking of images and video using direct sequence spread spectrum techniques George, M.; Chouinard, J.-V.; Georganas, N. Electrical and Computer Engineering, 1999 IEEE Canadian Conference on , vol.: 1, 1999 Page(s): 116-121 vol. 1.*
Secure spread spectrum watermarking for multimedia Cox, I.J.; Kilian, J.; Leighton, F.T.; Shamoon, T. Image Processingg, IEEE Transactions on , vol.: 6 Issue: 12, Dec. 1997 Page(s): 1673-1687.*
Optimum watermark detection and embedding in digital images Vidal, J.; Sayrol, E. Multimedia Signal Processing, 1998 IEEE Second Workshop on , 1998 Page(s): 285-290.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and systems for fingerprinting digital data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and systems for fingerprinting digital data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for fingerprinting digital data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3351494

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.