Methods and systems for fingerprinting digital data
First Claim
1. One or more protected digital objects embodied on one or more computer-readable media, individual digital objects being embedded with at least one fingerprinting word produced in accordance with a method comprising:
- defining a plurality of fingerprinting words, each fingerprinting word being unique and containing at least one spread sequence, wherein each fingerprinting word contains a pluralty of Γ
-symbols, each Γ
-symbol contains 2c-1 spread sequences, where c is the number of colluders that are desired to be defended against; and
assigning individual fingerprinting words to individual respective entities, the fingerprinting words serving to identify an entity to which it is assigned;
said fingerprinting words being structured to permit a collusion analysis to ascertain identities of potential colluders who change an associated fingerprinting word.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for fingerprinting digital data are described. In the described embodiment, Direct Sequence Spread Spectrum (DSSS) technology is utilized. Unique fingerprinting words are defined where each includes at least one spread sequence. In one embodiment, a fingerprinting word comprises a plurality symbols, called “Γ symbols.” Each Γ symbol is composed of 2c-1 blocks, where c represents the number of colluders that are desired to be protected against. Each block contains d spread sequence chips. The fingerprinting words are assigned to a plurality of entities to which protected objects embedded with the fingerprinting words are to be distributed. To ascertain the identity of an entity that has altered its unique fingerprinting word, the relative weight of each block is computed in accordance with a defined function and blocks whose weights satisfy a predetermined relationship are “clipped” to a so-called working range. Each Γ-symbol of the altered fingerprinting word is then processed to produce a set of one or more colors that might be the subject of a collusion. Each Γ-symbol in the fingerprinting word for each entity is then evaluated against a corresponding produced set and the entity having the most overall Γ-symbol coincidences is incriminated.
-
Citations
15 Claims
-
1. One or more protected digital objects embodied on one or more computer-readable media, individual digital objects being embedded with at least one fingerprinting word produced in accordance with a method comprising:
-
defining a plurality of fingerprinting words, each fingerprinting word being unique and containing at least one spread sequence, wherein each fingerprinting word contains a pluralty of Γ
-symbols, each Γ
-symbol contains 2c-1 spread sequences, where c is the number of colluders that are desired to be defended against; andassigning individual fingerprinting words to individual respective entities, the fingerprinting words serving to identify an entity to which it is assigned; said fingerprinting words being structured to permit a collusion analysis to ascertain identities of potential colluders who change an associated fingerprinting word. - View Dependent Claims (2, 3, 4)
-
-
5. One or more protected digital objects embodied on one or more computer-readable media and produced in accordance with a method comprising:
-
defining a plurality of fingerprinting words, each fingerprinting word being unique and containing at least one spread sequence, wherein each fingerprinting word contains a plurality of Γ
-symbols, each Γ
-symbol containing 2c-1 spread sequences, where c is the number of colluders that are desired to be defended against, said fingerprinting words being structured to permit a collusion analysis to ascertain identities of potential colluders who change an associated fingerprinting word;assigning individual fingerprinting words to individual respective entities who constitute potential colluders, the fingerprinting words serving to identify an entity to which it is assigned; and embedding at least one fingerprinting word in at least one digital object. - View Dependent Claims (6, 7, 8)
-
-
9. A Γ
- -code data structure configured for use in an embedding process for protecting digital data, the Γ
-code data structure comprising;a memory; a plurality of spread sequences in the memory, the spread sequences being arranged in blocks that are combinable to define fingerprinting words that are assignable to individual entities to which protected objects are to be distributed, wherein the blocks are combinable to define individual Γ
-symbols, each Γ
-symbol comprising 2c-1 blocks, where e is the number of colluders that are desired to be defended against; andsaid fingerprinting words being structured to permit a collusion analysis to ascertain identifies of potential colluders who change an associated fingerprinting word.
- -code data structure configured for use in an embedding process for protecting digital data, the Γ
-
10. One or more protected objects comprising:
-
digital data embodied on one or more computer-readable media; and a fingerprinting word embedded in the digital data, the fingerprinting word containing at least one spread sequence, the fingerprinting word being associated with an entity to which the object is to be, or has been distributed, wherein the fingerprinting word contains a plurality of Γ
-symbols, wherein each Γ
-symbol contains a plurality of spread sequences, wherein each Γ
-symbol contains 2c-1 spread sequences, where c is the number of colluders that are desired to be defended against;said fingerprinting word being structured to permit a collusion analysis to ascertain one or more identifies of potential colluders who change the fingerprinting word. - View Dependent Claims (11, 12, 13, 14, 15)
-
Specification