Abstract
Fingerprinting schemes allow tracing of illegally redistributed multimedia contents. When using asymmetric fingerprinting, the merchant does not know the marked copy nor the embedded mark, so fraudulent distribution of the content by the merchant -which could lead to framing honest customers- is not possible. A problem with the deployment of classical asymmetric fingerprinting protocols is that they are based on information transfer methods whose implementation is difficult, if not infeasible. In this paper, we propose an architecture to obtain asymmetric fingerprinting through symmetric (and thus implementable) schemes and a trusted third party (TTP).