Collusion-resistant Fingerprinting of Parallel Content Channels

被引:0
|
作者
Joudeh, Basheer [1 ]
Skoric, Boris [1 ]
机构
[1] Eindhoven Univ Technol, Eindhoven, Netherlands
关键词
watermarking; traitor tracing; collusion attack; information theoretic security; TARDOS CODES;
D O I
10.1145/3531536.3532953
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The fingerprinting game is analysed when the coalition size.. is known to the tracer, but the colluders can distribute themselves across L TV channels. The collusion channel is introduced and the extra degrees of freedom for the coalition are made manifest in our formulation. We introduce a payoff functional that is analogous to the single TV channel case, and is conjectured to be closely related to the fingerprinting capacity. For the binary alphabet case under the marking assumption, and the restriction of access to one TV channel per person per segment, we derive the asymptotic behavior of the payoff functional. We find that the value of the maximin game for our payoff is asymptotically equal to L-2/k(2)2 ln 2, with optimal strategy for the tracer being the arcsine distribution, and for the coalition being the interleaving attack across all TV channels, as well as assigning an equal number of colluders across the L TV channels.
引用
收藏
页码:81 / 89
页数:9
相关论文
共 50 条
  • [21] Optimal Collusion-Resistant Mechanisms with Verification
    Penna, Paolo
    Ventre, Carmine
    10TH ACM CONFERENCE ON ELECTRONIC COMMERCE - EC 2009, 2009, : 147 - 156
  • [22] Optimal collusion-resistant mechanisms with verification
    Penna, Paolo
    Ventre, Carmine
    GAMES AND ECONOMIC BEHAVIOR, 2014, 86 : 491 - 509
  • [23] Collusion-Resistant Functional Encryption for RAMs
    Ananth, Prabhanjan
    Chung, Kai-Min
    Fan, Xiong
    Qian, Luowen
    ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 160 - 194
  • [24] A note on the limits of collusion-resistant watermarks
    Ergun, F
    Kilian, J
    Kumar, R
    ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 140 - 149
  • [25] A novel approach to collusion-resistant video watermarking
    Su, K
    Kundur, D
    Hatzinakos, D
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 491 - 502
  • [26] Collusion-resistant convertible ring signature schemes
    Jung Yeon Hwang
    Ku-Young Chang
    Hyun Sook Cho
    Boyeon Song
    Willy Susilo
    Science China Information Sciences, 2015, 58 : 1 - 16
  • [27] Collusion-Resistant Processing of SQL Range Predicates
    Kesarwani, Manish
    Kaul, Akshar
    Singh, Gagandeep
    Deshpande, Prasad M.
    Haritsa, Jayant R.
    DATA SCIENCE AND ENGINEERING, 2018, 3 (04) : 323 - 340
  • [28] Collusion-Resistant Anonymous Data Collection Method
    Ashrafi, Mafruz Zaman
    Ng, See Kiong
    KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2009, : 69 - 77
  • [29] Collusion-Resistant Worker Recruitment in Crowdsourcing Systems
    Xiao, Mingyan
    Jin, Wenqiang
    Li, Ming
    Yang, Lei
    Thapa, Arun
    Li, Pan
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (01) : 129 - 144
  • [30] Collusion-Resistant Processing of SQL Range Predicates
    Kesarwani, Manish
    Kaul, Akshar
    Singh, Gagandeep
    Deshpande, Prasad M.
    Haritsa, Jayant R.
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2018), PT II, 2018, 10828 : 211 - 227