Analysis of binary fingerprinting codes under relaxed marking assumption

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

There are many studies on the performance of binary fingerprinting codes under a well-known marking assumption. Among many fingerprinting codes, we focus on Tardos codes and Nuida's variants. From the signal processing point of view, the relaxation of the assumption is required for the analysis. In this paper, we consider the averaging attack which has been studied in the spread-spectrum-based fingerprinting schemes, and propose an optimal detector based on a maximum likelihood decoding. From our theoretical analysis about the effect on a pirated codeword caused by the averaging attack, it is revealed that the false-positive probability is strongly dependent on the number of colluders.

Original languageEnglish
Title of host publication2012 International Symposium on Information Theory and Its Applications, ISITA 2012
Pages643-647
Number of pages5
Publication statusPublished - Dec 1 2012
Externally publishedYes
Event2012 International Symposium on Information Theory and Its Applications, ISITA 2012 - Honolulu, HI, United States
Duration: Oct 28 2012Oct 31 2012

Publication series

Name2012 International Symposium on Information Theory and Its Applications, ISITA 2012

Other

Other2012 International Symposium on Information Theory and Its Applications, ISITA 2012
CountryUnited States
CityHonolulu, HI
Period10/28/1210/31/12

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Fingerprint Dive into the research topics of 'Analysis of binary fingerprinting codes under relaxed marking assumption'. Together they form a unique fingerprint.

  • Cite this

    Kuribayashi, M. (2012). Analysis of binary fingerprinting codes under relaxed marking assumption. In 2012 International Symposium on Information Theory and Its Applications, ISITA 2012 (pp. 643-647). [6401018] (2012 International Symposium on Information Theory and Its Applications, ISITA 2012).