메뉴 건너뛰기




Volumn 1, Issue 2, 2006, Pages 248-255

The Boneh-Shaw fingerprinting scheme is better than we thought

Author keywords

Collusion secure codes; Copyright protection; Digital fingerprinting (FP); Traitor tracing

Indexed keywords

COLLUSION-SECURE CODES; COPYRIGHT PROTECTION; DIGITAL FINGERPRINTING (FP); TRAITOR TRACING;

EID: 33744751840     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2006.873596     Document Type: Article
Times cited : (22)

References (15)
  • 2
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Sep.
    • D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 4
    • 15044340426 scopus 로고    scopus 로고
    • On the capacity game of private fingerprinting systems under collusion attacks
    • Mar.
    • A. Somekh-Baruch and N. Merhav, "On the capacity game of private fingerprinting systems under collusion attacks," IEEE Trans. Inf. Theory, vol. 51, no. 3, pp. 884-899, Mar. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.3 , pp. 884-899
    • Somekh-Baruch, A.1    Merhav, N.2
  • 5
    • 0025383763 scopus 로고
    • A guided tour of Chernoff bounds
    • T. Hagerup and C. Rüb, "A guided tour of Chernoff bounds," Inf. Process. Lett., vol. 33, pp. 305-308, 1990.
    • (1990) Inf. Process. Lett. , vol.33 , pp. 305-308
    • Hagerup, T.1    Rüb, C.2
  • 6
    • 0037399342 scopus 로고    scopus 로고
    • Digital fingerprinting codes: Problem statements, constructions, identification of traitors
    • Apr.
    • A. Barg, G. R. Blakley, and G. A. Kabatiansky, "Digital fingerprinting codes: Problem statements, constructions, identification of traitors," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 852-865, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 852-865
    • Barg, A.1    Blakley, G.R.2    Kabatiansky, G.A.3
  • 7
    • 2642540974 scopus 로고    scopus 로고
    • Collusion secure codes: Systematic security definitions and their relations
    • May
    • K. Yoshioka, J. Shikata, and T. Matsumoto, "Collusion secure codes: Systematic security definitions and their relations," IEICE Trans. Fundamentals, vol. E87-A, no. 5, May 2004.
    • (2004) IEICE Trans. Fundamentals , vol.E87-A , Issue.5
    • Yoshioka, K.1    Shikata, J.2    Matsumoto, T.3
  • 8
    • 33744721541 scopus 로고    scopus 로고
    • Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring
    • Information Hiding 2004, J. Fridrich, Ed.
    • H. Muratani, "Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring," in Information Hiding 2004, J. Fridrich, Ed., 2004, vol. 3200, Lecture Notes Comput. Sci., pp. 282-292.
    • (2004) Lecture Notes Comput. Sci. , vol.3200 , pp. 282-292
    • Muratani, H.1
  • 9
    • 84947944329 scopus 로고    scopus 로고
    • Error- and collusion-secure finger-printing for digital data
    • Proc. Information Hiding, New York Springer-Verlag
    • H.-J. Guth and B. Pfitzmann, "Error- and collusion-secure finger-printing for digital data," in Proc. Information Hiding, New York, 2000, vol. 1768, Lecture Notes Comput. Sci., pp. 134-145, Springer-Verlag.
    • (2000) Lecture Notes Comput. Sci. , vol.1768 , pp. 134-145
    • Guth, H.-J.1    Pfitzmann, B.2
  • 10
    • 0033183669 scopus 로고    scopus 로고
    • Improved decoding of Reed-Solomon and algebraic-geometry codes
    • Sep.
    • V. Guruswami and M. Sudan, "Improved decoding of Reed-Solomon and algebraic-geometry codes," IEEE Trans. Inform. Theory, vol. 45, no. 6, pp. 1757-1767, Sep. 1999.
    • (1999) IEEE Trans. Inform. Theory , vol.45 , Issue.6 , pp. 1757-1767
    • Guruswami, V.1    Sudan, M.2
  • 11
    • 0000377676 scopus 로고
    • Algebraic-geometric codes and asymptotic problems
    • M. A. Tsfasman, "Algebraic-geometric codes and asymptotic problems," Discrete Appl. Math., vol. 33, no. 1-3, pp. 241-256, 1991.
    • (1991) Discrete Appl. Math. , vol.33 , Issue.1-3 , pp. 241-256
    • Tsfasman, M.A.1
  • 12
    • 21144436639 scopus 로고    scopus 로고
    • Fighting two pirates
    • Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. New York: Springer-Verlag, May
    • H. G. Schaathun, "Fighting two pirates," in Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. New York: Springer-Verlag, May 2003, vol. 2643, Lecture Notes Comput. Sci., pp. 71-78.
    • (2003) Lecture Notes Comput. Sci. , vol.2643 , pp. 71-78
    • Schaathun, H.G.1
  • 13
    • 33744770800 scopus 로고    scopus 로고
    • Optimal probabilistic fingerprint codes
    • To appear. In part at STOC'03
    • G. Tardos, "Optimal probabilistic fingerprint codes," J. ACM, 2005, To appear. In part at STOC'03.
    • (2005) J. ACM
    • Tardos, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.