Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes

Boris Škorić1, Stefan Katzenbeisser1, Mehmet Utku Celik1
1Information and System Security, Philips Research Europe, Eindhoven, The Netherlands

Tóm tắt

Từ khóa


Tài liệu tham khảo

Andrews G.E., Askey R., Roy R.: Special Functions. Encyclopedia of Mathematics and its Applications. Cambridge University Press (1999).

Bazant M.Z.: Random walks and diffusion. Technical report, MIT Lecture notes, http://www-math.mit.edu/18.366/lec/lec04.pdf (2005). Accessed October 2007

Boneh D., Shaw J. (1998). Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5): 1897–1905

Chor B., Fiat A., Naor M., Pinkas B. (2000). Tracing traitors. IEEE Trans. Inform. Theory 46(3): 893–910

Cox I.J., Miller M.L., Bloom J.A. (2002). Digital Watermarking. Morgan Kaufmann Publishers, San Francisco, CA, USA

Devroye L.: Non-Uniform Random Variate Generation. Springer-Verlag (1986). Available online at http://cg.scs.carleton.ca/~luc/rnbookindex.htm .

Digital Cinema Initiatives, LLC. Digital cinema system specification v1.1. http://www.dcimovies.com/DCI_DCinema_System_Spec_v1_1.pdf (2007). Accessed October 2007

Hollmann H.D.L., van Lint J.H., Linnartz J-P., Tolhuizen L.M.G.M. (1998). On codes with the identifiable parent property. J. Comb. Theory 82: 472–479

Langelaar G.C., Setyawan I., Lagendijk R.L. (2000). Watermarking digital image and video data. IEEE SPMAG 17(5): 20–46

Peikert C., Shelat A., Smith A.: Lower bounds for collusion-secure fingerprinting. In: Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 472–478 (2003).

Škorić B., Vladimirova T.U., Celik M., Talstra J.C.: Tardos fingerprinting is better than we thought. Technical report, Submitted to IEEE Trans. Inform. Theory. Preprint at arXiv repository, http://www.arxiv.org/abs/cs.CR/0607131 (2006).

Staddon J.N., Stinson D.R., Wei R. (2001). Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inform. Theory 47(3): 1042–1049

Tardos G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC), pp. 116–125 (2003).