Collusion-resistant Fingerprinting of Parallel Content Channels

被引:0
|
作者
Joudeh, Basheer [1 ]
Skoric, Boris [1 ]
机构
[1] Eindhoven Univ Technol, Eindhoven, Netherlands
关键词
watermarking; traitor tracing; collusion attack; information theoretic security; TARDOS CODES;
D O I
10.1145/3531536.3532953
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The fingerprinting game is analysed when the coalition size.. is known to the tracer, but the colluders can distribute themselves across L TV channels. The collusion channel is introduced and the extra degrees of freedom for the coalition are made manifest in our formulation. We introduce a payoff functional that is analogous to the single TV channel case, and is conjectured to be closely related to the fingerprinting capacity. For the binary alphabet case under the marking assumption, and the restriction of access to one TV channel per person per segment, we derive the asymptotic behavior of the payoff functional. We find that the value of the maximin game for our payoff is asymptotically equal to L-2/k(2)2 ln 2, with optimal strategy for the tracer being the arcsine distribution, and for the coalition being the interleaving attack across all TV channels, as well as assigning an equal number of colluders across the L TV channels.
引用
收藏
页码:81 / 89
页数:9
相关论文
共 50 条
  • [41] Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting
    Megias, David
    Qureshi, Amna
    EXPERT SYSTEMS WITH APPLICATIONS, 2017, 71 : 147 - 172
  • [42] Functional Re-encryption and Collusion-Resistant Obfuscation
    Chandran, Nishanth
    Chase, Melissa
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 404 - 421
  • [43] Collusion-Resistant Mechanisms for Single-Parameter Agents
    Goldberg, Andrew V.
    Hartline, Jason D.
    PROCEEDINGS OF THE SIXTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2005, : 620 - 629
  • [44] Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions
    Penna, Paolo
    Ventre, Carmine
    ACM TRANSACTIONS ON COMPUTATION THEORY, 2012, 4 (02)
  • [45] AudiWFlow: Confidential, collusion-resistant auditing of distributed workflows
    Zhou, Xiaohu
    Nehme, Antonio
    Jesus, Vitor
    Wang, Yonghao
    Josephs, Mark
    Mahbub, Khaled
    Abdallah, Ali
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2022, 3 (03):
  • [46] Collusion-resistant video watermarking based on video mosaicing
    Koubaa, M.
    Amar, C. Ben
    Nicolas, H.
    ISM 2006: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2006, : 161 - 166
  • [47] Collusion-resistant dynamic spectrum resource renting and offering mechanism
    Liu, Ying-Ting
    Liu, Xin
    Li, Zan
    Zhang, Hai-Lin
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2011, 41 (05): : 1497 - 1502
  • [48] Collusion-Resistant Jamming for Securing Legacy Clients in Wireless Networks
    Xie, Dianhan
    Mao, Wenguang
    Tang, Aimin
    Wang, Xudong
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (10) : 2264 - 2277
  • [49] Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
    Hiroka, Taiga
    Kitagawa, Fuyuki
    Morimae, Tomoyuki
    Nishimaki, Ryo
    Pal, Tapas
    Yamakawa, Takashi
    ADVANCES IN CRYPTOLOGY, PT III, EUROCRYPT 2024, 2024, 14653 : 434 - 456
  • [50] Collusion-Resistant Query Anonymization for Location-Based Services
    Zhang, Qin
    Lazos, Loukas
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 768 - 774