A Coding Approach for Detection of Tampering in Write-Once Optical Disks

Copyright [©] (1998) by IEEE. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distrubuted for profit. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee.

We present coding methods for protecting against tampering of write-once optical disks which turns them into a secure digital medium for applications where critical information must be stored in a way that prevents or allows detection of an attempt at falsification. Our method involves adding a small amount of redundancy to a modulated sector of data. This extra redundancy is not used for normal operation, but can be used for determining, say as a testimony in court, that a disk has not been tampered with.

By: Mario Blaum, Kurt Rubin, Wilfried Lenth and Jehoshua Bruck (CA Inst. of Technology)

Published in: IEEE Transactions on Computers, volume 47, (no 1), pages 120-5 in 1998

Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.

Questions about this service can be mailed to reports@us.ibm.com .