Collusion-resistant Fingerprinting of Parallel Content Channels

被引:0
|
作者
Joudeh, Basheer [1 ]
Skoric, Boris [1 ]
机构
[1] Eindhoven Univ Technol, Eindhoven, Netherlands
关键词
watermarking; traitor tracing; collusion attack; information theoretic security; TARDOS CODES;
D O I
10.1145/3531536.3532953
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The fingerprinting game is analysed when the coalition size.. is known to the tracer, but the colluders can distribute themselves across L TV channels. The collusion channel is introduced and the extra degrees of freedom for the coalition are made manifest in our formulation. We introduce a payoff functional that is analogous to the single TV channel case, and is conjectured to be closely related to the fingerprinting capacity. For the binary alphabet case under the marking assumption, and the restriction of access to one TV channel per person per segment, we derive the asymptotic behavior of the payoff functional. We find that the value of the maximin game for our payoff is asymptotically equal to L-2/k(2)2 ln 2, with optimal strategy for the tracer being the arcsine distribution, and for the coalition being the interleaving attack across all TV channels, as well as assigning an equal number of colluders across the L TV channels.
引用
收藏
页码:81 / 89
页数:9
相关论文
共 50 条
  • [31] Collusion-resistant convertible ring signature schemes
    Hwang, Jung Yeon
    Chang, Ku-Young
    Cho, Hyun Sook
    Song, Boyeon
    Susilo, Willy
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (01) : 1 - 16
  • [32] Collusion-resistant convertible ring signature schemes
    HWANG Jung Yeon
    CHANG Ku-Young
    CHO Hyun Sook
    SONG Boyeon
    SUSILO Willy
    ScienceChina(InformationSciences), 2015, 58 (01) : 134 - 149
  • [33] Collusion-resistant fingerprints from WBE sequence sets
    Li, Z
    Trappe, W
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 1336 - 1340
  • [34] A collusion-resistant dynamic key management scheme for WSNs
    Zhan, Furui
    Yao, Nianmin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6351 - 6364
  • [35] Statistical invisibility for collusion-resistant digital video watermarking
    Su, K
    Kundur, D
    Hatzinakos, D
    IEEE TRANSACTIONS ON MULTIMEDIA, 2005, 7 (01) : 43 - 51
  • [36] A Collusion-Resistant Automation Scheme for Social Moderation Systems
    Lou, Jing-Kai
    Chen, Kuan-Ta
    Lei, Chin-Laung
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 571 - +
  • [37] Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions
    Penna, Paolo
    Ventre, Carmine
    ALGORITHMS - ESA 2008, 2008, 5193 : 708 - +
  • [38] Bounded Collusion-Resistant Registered Functional Encryption for Circuits
    Zhang, Yijian
    Chen, Jie
    He, Debiao
    Zhang, Yuqing
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT I, 2025, 15484 : 32 - 64
  • [39] Collusion-Resistant Repeated Double Auctions for Cooperative Communications
    Xu, Zichuan
    Liang, Weifa
    9TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2012), 2012, : 443 - 447
  • [40] Collusion-resistant, Incentive-compatible Feedback Payments
    Jurca, Radu
    Faltings, Boi
    EC'07: PROCEEDINGS OF THE EIGHTH ANNUAL CONFERENCE ON ELECTRONIC COMMERCE, 2007, : 200 - 209