Maximin optimality of the arcsine fingerprinting distribution and the interleaving attack for large coalitions (original) (raw)
Related papers
Universal fingerprinting: Capacity and random-coding exponents
2008 IEEE International Symposium on Information Theory, 2008
On the Saddle-Point Solution and the Large-Coalition Asymptotics of Fingerprinting Games
IEEE Transactions on Information Forensics and Security, 2012
Boneh-Shaw fingerprint code and Tardos code analysis and optimization in minority collusion attack
Measurement Sensors, volume 33, pages 101173, 2024
On the Fingerprinting Capacity Under the Marking Assumption
Prasanth Anthapadmanabhan, Ilya Dumer
IEEE Transactions on Information Theory, 2000
High rate fingerprinting codes and the fingerprinting capacity
Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2009
On the Capacity Game of Private Fingerprinting Systems Under Collusion Attacks
IEEE Transactions on Information Theory, 2005
Analysis of Boneh-Shaw Finger Printing Codes under Majority Value Collusion Attacks
International Journal of Computer Applications, 2017
Regular Simplex Fingerprints and Their Optimality Properties
IEEE Transactions on Information Forensics and Security, 2000
Evaluating Performance of Boneh-Shaw Finger Printing Codes under Minority Value Collusion Attacks
The 12th International Conference on Computational Intelligence and Communication Networks (CICN 2020), 2020
Analysis of Boneh-Shaw Finger Printing Codes under Randomized Bits Collusion Attacks
Journal of Computer Science IJCSIS
Analysis total and better the Boneh-Shaw Fingerprinting codes
2013
A collusion attack optimization framework toward spread-spectrum fingerprinting
Applied Soft Computing, 2013
New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting
Lecture Notes in Computer Science
Saddle-point solution of the fingerprinting capacity game under the marking assumption
2009 IEEE International Symposium on Information Theory, 2009
Decoding Fingerprinting Using the Markov Chain Monte Carlo Method
2012
Capacity and optimal collusion attack channels for Gaussian fingerprinting games
SPIE Proceedings, 2007
On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes
Lecture Notes in Computer Science, 2008
Near-optimal collusion-secure fingerprinting codes for efficiently tracing illegal re-distribution
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012
Anti-Collusion Digital Fingerprinting Codes via Partially Cover-Free Families
International Journal of Intelligent Systems And Applications in Engineering, 2022
Fingerprinting Codes for Multimedia Data against Averaging Attack
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009
Collusion-resistant fingerprints based on the use of superimposed codes in real vector spaces
2009 International Multiconference on Computer Science and Information Technology, 2009
Simulating Tardos Finger Printing Codes under Randomized Bits Collusion Attacks
ICCCIS-2021, International Conference on Computing,Communication, and Intelligent Systems 19th-20th February, 2021 Greater , 2021
An improvement of discrete Tardos fingerprinting codes
Designs, Codes and Cryptography, 2009
Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97, 1997
Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data
Cornell University - arXiv, 2020
On fingerprinting capacity games for arbitrary alphabets and their asymptotics
2012 IEEE International Symposium on Information Theory Proceedings, 2012
Decoding fingerprints using the Markov Chain Monte Carlo method
2012 IEEE International Workshop on Information Forensics and Security (WIFS), 2012
Expectation maximisation decoding of tardos probabilistic fingerprinting code
Media Forensics and Security, 2009
Expectation maximization decoding of Tardos probabilistic fingerprinting code
2009
An Asymmetric Fingerprinting Scheme Based on Tardos Codes
Lecture Notes in Computer Science, 2011
Identifying Traitors Using the Koetter–Vardy Algorithm
IEEE Transactions on Information Theory, 2000
Optimization of Memory Usage in Tardos's Fingerprinting Codes
2006
2006 IEEE International Conference on Acoustics Speed and Signal Processing Proceedings
Worst case attacks against binary probabilistic traitor tracing codes
2009 First IEEE International Workshop on Information Forensics and Security (WIFS), 2009