Abstract
The talk presented a short history of collusion resistant fingerprinting concentrating on recent results that represent joint work with Ehsan Amiri.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Amiri, E., Tardos, G.: High rate fingerprinting codes and the fingerprinting capacity. In: Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2009), pp. 336–345 (2009)
Anthapadmanabhan, N.P., Barg, A., Dumer, I.: Fingerprinting capacity under the marking assumption. IEEE Transactions on Information Theory 54(6), 2678–2689 (2008); Preliminary version appeared in the Proceedings of the 2007 IEEE International Symposium on Information Theory, ISIT 2007 (2007)
Blayer, O., Tassa, T.: Improved versions of Tardos’ fingerprinting scheme. Designs, Codes and Cryptography 48, 79–103 (2008)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions of Information Theory 44, 480–491 (1988)
Huang, Y., Moulin, P.: Saddle-point solution of the fingerprinting capacity game under the marking assumption. In: Proceedings of the IEEE International Symposium on Information Theory, ISIT 2009 (2009)
Moulin, P.: Universal fingerprinting: capacity and random-coding exponents. In: Proceedings of the IEEE International Symposium on Information Theory (ISIT 2008), pp. 220–224 (2008)
Nuida, K., Fujitsu, S., Hagiwara, M., Kitagawa, T., Watanabe, H., Ogawa, K., Imai, H.: An improvement of the discrete Tardos fingerprinting codes. Cryptology ePrint Archive, Report 2008/338
Nuida, K., Hagiwara, M., Watanabe, H., Imai, H.: Optimization of Tardos’s fingerprinting codes in a viewpoint of memory amount. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 279–293. Springer, Heidelberg (2008)
Škorić, B., Katzenbeisser, S., Celik, M.U.: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Designs, Codes and Cryptography 46(2), 137–166 (2008)
Škorić, B., Vladimirova, T.U., Celik, M., Talstra, J.C.: Tardos fingerprinting is better than we thought. IEEE Transactions on Information Theory 54(8), 3663–3676 (2008)
Tardos, G.: Optimal probabilistic fingerprint codes. Journal of the ACM (to appear); Preliminary version appeared in Proceedings of the 35th Annual ACM Symposium on Theory of Computing, (STOC 2003), pp. 116–125
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tardos, G. (2010). Capacity of Collusion Secure Fingerprinting — A Tradeoff between Rate and Efficiency. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds) Information Hiding. IH 2010. Lecture Notes in Computer Science, vol 6387. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16435-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-16435-4_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16434-7
Online ISBN: 978-3-642-16435-4
eBook Packages: Computer ScienceComputer Science (R0)