With the development of e-commerce, digital product has been the main format of multimedia product onthe Internet. At the same time, the problem of copyright protection has gained much attention. Because of the char-a...With the development of e-commerce, digital product has been the main format of multimedia product onthe Internet. At the same time, the problem of copyright protection has gained much attention. Because of the char-acter to be copied easily, the software products such as JPEG or GIF images, applications and documents are beingcopied illegally every day. This does harm to the merchants' benefit. The goal of digital fingerprinting protocol is tostudy a method based on cryptography to trace the source of illegal copy, which in certain conditions can be applied inall kinds of software product. The basic idea of digital fingerprinting, like the fingerprint of human being, is to embedan unique "fingerprint" into each copy of the product sent to the buyer. When finding the illegal copy, the merchantcan trace the source of it, who maybe is a dishonest buyer called traitor, accuse the traitor. So the merchant can pro-tect his copyright. This paper introduces the history of digital fingerprinting protocol and discusses some of the im-portant protocol schemes.展开更多
文摘With the development of e-commerce, digital product has been the main format of multimedia product onthe Internet. At the same time, the problem of copyright protection has gained much attention. Because of the char-acter to be copied easily, the software products such as JPEG or GIF images, applications and documents are beingcopied illegally every day. This does harm to the merchants' benefit. The goal of digital fingerprinting protocol is tostudy a method based on cryptography to trace the source of illegal copy, which in certain conditions can be applied inall kinds of software product. The basic idea of digital fingerprinting, like the fingerprint of human being, is to embedan unique "fingerprint" into each copy of the product sent to the buyer. When finding the illegal copy, the merchantcan trace the source of it, who maybe is a dishonest buyer called traitor, accuse the traitor. So the merchant can pro-tect his copyright. This paper introduces the history of digital fingerprinting protocol and discusses some of the im-portant protocol schemes.