GENERALIZED TRAITOR TRACING FOR NESTED CODES

被引:0
|
作者
Varna, Avinash L. [1 ]
Jin, Hongxia [2 ]
机构
[1] Univ Maryland, Dept ECE, College Pk, MD 20742 USA
[2] IBM Corp, Almaden Res Ctr, San Jose, CA 95120 USA
关键词
Traitor Tracing; Nested Codes; Multimedia Content Protection;
D O I
10.1109/ICME.2008.4607496
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Nested or concatenated codes are often used for traitor tracing schemes as they require a small symbol size to accommodate a given number of users. Typically, tracing is performed on each layer of the code separately - tracing is first performed on the inner code and the information obtained is subsequently used to perform tracing on the outer code. In such situations, the collusion resistance is determined by the minimum of the coalition sizes that can be tolerated by the individual codes. Due to the small symbol size, the inner codes can tolerate a smaller number of colluders resulting in a small overall collusion resistance. Further, recovering more attacked versions does not enable identification of larger coalitions. To improve the collusion resistance, in this paper we propose to pass soft information from the inner code tracing to the outer code tracing. We demonstrate through simulations and formal analysis that the proposed technique improves the collusion resistance of tracing systems employing nested codes.
引用
收藏
页码:561 / +
页数:2
相关论文
共 50 条
  • [1] EM Decoding of Tardos Traitor Tracing Codes
    Furon, Teddy
    Perez-Freire, Luis
    [J]. MM&SEC'09: PROCEEDINGS OF THE 2009 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, 2009, : 99 - 106
  • [2] Efficient traitor tracing from collusion secure codes
    Billet, Olivier
    Phan Duong Hieu
    [J]. INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 171 - +
  • [3] BLIND DECODER FOR BINARY PROBABILISTIC TRAITOR TRACING CODES
    Perez-Freire, Luis
    Furon, Teddy
    [J]. 2009 FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2009, : 46 - +
  • [4] WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES
    Furon, Teddy
    Perez-Freire, Luis
    [J]. 2009 FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2009, : 56 - +
  • [5] Hybrid traitor tracing
    Jin, Hongxia
    Lotspiech, Jeffery
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO - ICME 2006, VOLS 1-5, PROCEEDINGS, 2006, : 1329 - +
  • [6] Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes
    Fontaine, Caroline
    Gambs, Sebastien
    Lolive, Julien
    Onete, Cristina
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 199 - 218
  • [7] Dynamic Traitor Tracing
    Amos Fiat
    Tamir Tassa
    [J]. Journal of Cryptology, 2001, 14 : 211 - 223
  • [8] Sequential traitor tracing
    Safavi-Naini, R
    Wang, YJ
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 316 - 332
  • [9] Dynamic traitor tracing
    Fiat, A
    Tassa, T
    [J]. JOURNAL OF CRYPTOLOGY, 2001, 14 (03) : 211 - 223
  • [10] A new traitor tracing
    Mitsunari, S
    Sakai, R
    Kasahara, M
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (02) : 481 - 484