Maximin optimality of the arcsine fingerprinting distribution and the interleaving attack for large coalitions (original) (raw)

Universal fingerprinting: Capacity and random-coding exponents

Pierre Moulin

2008 IEEE International Symposium on Information Theory, 2008

View PDFchevron_right

On the Saddle-Point Solution and the Large-Coalition Asymptotics of Fingerprinting Games

Pierre Moulin

IEEE Transactions on Information Forensics and Security, 2012

View PDFchevron_right

Boneh-Shaw fingerprint code and Tardos code analysis and optimization in minority collusion attack

ALOK TRIPATHI

Measurement Sensors, volume 33, pages 101173, 2024

View PDFchevron_right

On the Fingerprinting Capacity Under the Marking Assumption

Prasanth Anthapadmanabhan, Ilya Dumer

IEEE Transactions on Information Theory, 2000

View PDFchevron_right

High rate fingerprinting codes and the fingerprinting capacity

Gábor Tardos

Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2009

View PDFchevron_right

On the Capacity Game of Private Fingerprinting Systems Under Collusion Attacks

N. Merhav

IEEE Transactions on Information Theory, 2005

View PDFchevron_right

Analysis of Boneh-Shaw Finger Printing Codes under Majority Value Collusion Attacks

ALOK TRIPATHI

International Journal of Computer Applications, 2017

View PDFchevron_right

Regular Simplex Fingerprints and Their Optimality Properties

Pierre Moulin

IEEE Transactions on Information Forensics and Security, 2000

View PDFchevron_right

Evaluating Performance of Boneh-Shaw Finger Printing Codes under Minority Value Collusion Attacks

ALOK TRIPATHI

The 12th International Conference on Computational Intelligence and Communication Networks (CICN 2020), 2020

View PDFchevron_right

Analysis of Boneh-Shaw Finger Printing Codes under Randomized Bits Collusion Attacks

Journal of Computer Science IJCSIS

View PDFchevron_right

Analysis total and better the Boneh-Shaw Fingerprinting codes

solmaz sharifnia

2013

View PDFchevron_right

A collusion attack optimization framework toward spread-spectrum fingerprinting

Mudar Sarem

Applied Soft Computing, 2013

View PDFchevron_right

New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting

Toshiyasu Matsushima

Lecture Notes in Computer Science

View PDFchevron_right

Saddle-point solution of the fingerprinting capacity game under the marking assumption

Pierre Moulin

2009 IEEE International Symposium on Information Theory, 2009

View PDFchevron_right

Decoding Fingerprinting Using the Markov Chain Monte Carlo Method

Teddy Furon

2012

View PDFchevron_right

Capacity and optimal collusion attack channels for Gaussian fingerprinting games

Pierre Moulin

SPIE Proceedings, 2007

View PDFchevron_right

On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes

Teddy Furon

Lecture Notes in Computer Science, 2008

View PDFchevron_right

Near-optimal collusion-secure fingerprinting codes for efficiently tracing illegal re-distribution

Alan Liew

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012

View PDFchevron_right

Anti-Collusion Digital Fingerprinting Codes via Partially Cover-Free Families

Mausumi Bose

View PDFchevron_right

Comparison of Performance of Boneh-Shaw Finger Printing Codes with Tardos under Randomized Bits Collusion Attacks

ALOK TRIPATHI

International Journal of Intelligent Systems And Applications in Engineering, 2022

View PDFchevron_right

Fingerprinting Codes for Multimedia Data against Averaging Attack

Toshiyasu Matsushima

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009

View PDFchevron_right

Collusion-resistant fingerprints based on the use of superimposed codes in real vector spaces

Guillermo Luna

2009 International Multiconference on Computer Science and Information Technology, 2009

View PDFchevron_right

Simulating Tardos Finger Printing Codes under Randomized Bits Collusion Attacks

ALOK TRIPATHI

ICCCIS-2021, International Conference on Computing,Communication, and Intelligent Systems 19th-20th February, 2021 Greater , 2021

View PDFchevron_right

An improvement of discrete Tardos fingerprinting codes

Hideki Imai

Designs, Codes and Cryptography, 2009

View PDFchevron_right

Asymmetric fingerprinting for larger collusions

Birgit Pfitzmann

Proceedings of the 4th ACM conference on Computer and communications security - CCS '97, 1997

View PDFchevron_right

Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data

Erman Ayday

Cornell University - arXiv, 2020

View PDFchevron_right

On fingerprinting capacity games for arbitrary alphabets and their asymptotics

Pierre Moulin

2012 IEEE International Symposium on Information Theory Proceedings, 2012

View PDFchevron_right

Decoding fingerprints using the Markov Chain Monte Carlo method

Teddy Furon

2012 IEEE International Workshop on Information Forensics and Security (WIFS), 2012

View PDFchevron_right

Expectation maximisation decoding of tardos probabilistic fingerprinting code

Caroline Fontaine

Media Forensics and Security, 2009

View PDFchevron_right

Expectation maximization decoding of Tardos probabilistic fingerprinting code

Fuchun Xie

2009

View PDFchevron_right

An Asymmetric Fingerprinting Scheme Based on Tardos Codes

Teddy Furon

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Identifying Traitors Using the Koetter–Vardy Algorithm

José Beleza Moreira

IEEE Transactions on Information Theory, 2000

View PDFchevron_right

Optimization of Memory Usage in Tardos's Fingerprinting Codes

Hideki Imai

2006

View PDFchevron_right

A Novel Embedding Method For An Anti-Collusion Fingerprinting By Embedding Both A Code And An Orthogonal Fingerprint

Choong Yoo

2006 IEEE International Conference on Acoustics Speed and Signal Processing Proceedings

View PDFchevron_right

Worst case attacks against binary probabilistic traitor tracing codes

Luis Freire

2009 First IEEE International Workshop on Information Forensics and Security (WIFS), 2009

View PDFchevron_right