This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
A Coding Approach for Detection of Tampering in Write-Once Optical Disks
January 1998 (vol. 47 no. 1)
pp. 120-125

Abstract—We present coding methods for protecting against tampering of write-once optical disks, which turns them into a secure digital medium for applications where critical information must be stored in a way that prevents or allows detection of an attempt at falsification. Our method involves adding a small amount of redundancy to a modulated sector of data. This extra redundancy is not used for normal operation, but can be used for determining, say, as a testimony in court, that a disk has not been tampered with.

[1] R. Adler, M. Hassner, and J. Moussouris, "Method and Apparatus for Generating a Noiseless Sliding Block Code for a (1, 7) Channel with Rate 2/3," U.S. Patent 4,413,251, 1982.
[2] S. Al-Bassam and B. Bose, “Asymmetric/Unidirectional Error Correcting and Detecting Codes,” IEEE Trans. Computers, vol. 43, no. 5, pp. 590-597, May 1994.
[3] G.F.M. Beenker and K.A.S. Immink, "A Generalized Method for Encoding and Decoding Run-Length-Limited Binary Sequences," IEEE Trans. Information Theory, vol. 29, no. 5, pp. 751-754, Sept. 1983.
[4] J.M. Berger, "A Note on Error Detecting Codes for Asymmetric Channels," Information and Control, vol. 4, pp. 68-73, 1961.
[5] M. Blaum, ed., Codes for Detecting and Correcting Unidirectional Errors.Los Alamitos, Calif.: IEEE CS Press, June 1993.
[6] M. Blaum and H. van Tilborg, "On t-error correcting/all unidirectional error detecting codes," IEEE Trans. Computers, vol. 38, no. 11, pp. 1,493-1,501, Nov. 1989.
[7] J. Bruck and M. Blaum, “New Techniques for Constructing$t$-EC/AUED Codes,” IEEE Trans. Computers, vol. 41, no. 10, pp. 1,318-1,324, Oct. 1992.
[8] N. Glover and T. Dudley, Practical Error Correction Design for Engineers. Data Systems Technology Corp., 1988.
[9] M. Horie, T. Tamura, M. Ohgaki, H. Yoshida, Y. Kisaka, and Y.J. Kobayashi, "TeSeF Films by TeSe SeF6-Ar Reactive Sputtering for Ablative Optical Recording," J. Applied Physics, vol. 75, no. 5, pp. 2,680-2,689, Mar. 1994.
[10] K.A.S. Immink, Coding Techniques for Digital Recorders. London: Prentice Hall, 1991.
[11] E.L. Leiss, "Data Integrity in Optical Disks," IEEE Trans. Computers, vol. 33, no. 9, pp. 818-827, Sept. 1984.
[12] A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, Fla., 1996, pp. 543-590.
[13] T. Nishida, H. Sugiyama, and S. Horigome, "SnSbSe/SbBi Bilayer Phase Change Media for High Density Write Once Optical Recording," Japanese J. Applied Physics 1, Regular Paper Short Notes, vol. 34, no. 3, pp. 1,562-1,568, Mar. 1995.
[14] K.A. Rubin, H.J. Rosen, W.W. Tang, W. Imaino, and T.C. Strand, "Multilevel Volumetric Optical Storage," Proc. SPIE—Int'l Soc. Optical Eng., vol. 2,338, pp. 247-253, 1994.
[15] B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C.New York: John Wiley&Sons, Inc., 1996.
[16] D.R. Stinson, Cryptography: Theory and Practice. Boca Raton, Fla.: CRC Press, 1995.
[17] A.J.G. Strandjord, S.P. Webb, D.J. Perettie, and R.A. Cipriano, "Flexible Storage Medium for Write Once Optical Tape," Proc. SPIE—Int'l Soc. Optical Eng., vol. 1,663, pp. 362-371, 1992.
[18] H.C.A. van Tilborg, An Introduction to Cryptology. Kluwer Academic, 1988.
[19] C. Yokota, T. Sasakawa, and H. Hyakutake, "Phthalocyanine CDR for High Speed Recording," Proc. SPIE—Int'l Soc. Optical Eng., vol. 2,514, pp. 249-257, 1995.

Index Terms:
Optical disks, (d, k) codes, write-once memory, data integrity, tampering.
Citation:
Mario Blaum, Jehoshua Bruck, Kurt Rubin, Wilfried Lenth, "A Coding Approach for Detection of Tampering in Write-Once Optical Disks," IEEE Transactions on Computers, vol. 47, no. 1, pp. 120-125, Jan. 1998, doi:10.1109/12.656095
Usage of this product signifies your acceptance of the Terms of Use.