International Journal of INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING ISSN:2147-67992147-6799 www.ijisae.org Original Research Paper International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2023, 11(2s), 0110 | 1 Comparison of Performance of Boneh-Shaw Finger Printing Codes with Tardos Under Randomized Bits Collusion Attacks Alok Tripathi 1 ,Rajiv Pandey 2 ,Amarjeet Singh 3 Submitted: 10/10/2022 Revised: 25/12/2022 Accepted: 20/01/2023 Abstract: Fingerprinting codes are needed for the protection of copyright issues of digital media. Before distributing digital media these codes are embedded in it. These codes are unique for each digital media. When illegal copies of these digital media are made they are identified by unique fingerprinting code inserted in them. In this way, culprits making illegal copies are identified. But these fingerprinting codes are subject to collusion attacks. In Collusion attacks, culprit users conspire together to instigate attacks against fingerprint codes. The culprit users cartelise and does the modification in the fingerprinting code of the digital media . The fingerprinting codes are changed in such a way so that an innocent user is found the culprit. Thus, these attacks are bottlenecks in protecting the digital rights of digital media. This research compares results of Boneh-Shaw fingerprinting codes with tardos code while launching Randomized bits Collusion attacks on both the codes. Keywords: Boneh-Shaw fingerprinting codes, Tardos-Codes, Randomised Bits Collusion Attacks,Piracy Protection. 1. Introduction 1.1 Digital Water Marking In digital watermarking, a marker is secretly embedded in an audio, video, or image file. This marker is used to identify the owner of the audio, video, or image file. "This marker does not have any relation to the original data of the audio, video, or image file. Thus simply we can say that these watermarks are used to verify the authenticity and integrity of the digital media. Thus they are used to check the piracy of digital media. Fig. 1. Digital Water Marking The above figure exhibits the whole process. 1.2 Digital Finger Printing In Digital Fingerprinting unique codes are constructed using various algorithms . These unique codes are then embedded into the audio, video, or image file. Now one to one mapping of the codes embedded is done with the digital media file corresponding to that code and a separate database is maintained.. If a copyright violation is found after the distribution of these files the comparison of databse maintained with the fingerprinting code that is unique is done and the piracy of digital media is detected. Thus it is easy to catch the guilty usesr doing the piracy. Thus these markers are used to check the piracy of digital media. The following figure exhibits the whole piracy detection process. 1 ,Amity Institute of Information Technology, Lucknow, Amity University, Uttar Pradesh, India, gkp.alok@gmail.com 2 Amity Institute of Information Technology, Lucknow, Amity University, Uttar Pradesh, India, rpandey@lko.amity.edu Sri Ram Institute of Management and Technology Kashipur, Uttrakhand, India, singhamarjeet.9@gmail.com