메뉴 건너뛰기




Volumn 53, Issue 5, 2007, Pages 1827-1838

Achievable error exponents for the private fingerprinting game

Author keywords

Coding with side information; Error exponents; Fingerprinting; Information hiding; Private watermarking; Randomized code; Steganography; Universal decoding; Watermarking

Indexed keywords

CODES (SYMBOLS); DATA HANDLING; DECODING; ERROR DETECTION; MULTIPLE ACCESS INTERFERENCE;

EID: 34248357288     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2007.894632     Document Type: Article
Times cited : (19)

References (38)
  • 1
    • 34248369755 scopus 로고    scopus 로고
    • N. P. Anthapadmanabhan, A. Barg, and I. Dumer, Fingerprinting Capacity Under the Marking Assumption, 2006 [Online]. Available: http://arxiv.org/ PS_cache/cs/pdf/0612/0612073.pdf, preprint
    • N. P. Anthapadmanabhan, A. Barg, and I. Dumer, Fingerprinting Capacity Under the Marking Assumption, 2006 [Online]. Available: http://arxiv.org/ PS_cache/cs/pdf/0612/0612073.pdf, preprint
  • 3
    • 0037399342 scopus 로고    scopus 로고
    • Digital fingerprinting codes: Problem statements, constructions, identification of traitors
    • Apr
    • A. Barg, G. R. Blakley, and G. Kabatiansky, "Digital fingerprinting codes: Problem statements, constructions, identification of traitors," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 852-865, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 852-865
    • Barg, A.1    Blakley, G.R.2    Kabatiansky, G.3
  • 4
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Sep
    • D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 5
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 7
    • 0007370350 scopus 로고    scopus 로고
    • Copyright protection for digital data
    • May
    • G. Cohen, S. Encheva, and G. Zémor, "Copyright protection for digital data," IEEE Commun. Lett., vol. 4, no. 5, pp. 158-160, May 2000.
    • (2000) IEEE Commun. Lett , vol.4 , Issue.5 , pp. 158-160
    • Cohen, G.1    Encheva, S.2    Zémor, G.3
  • 8
    • 0036612282 scopus 로고    scopus 로고
    • The Gaussian watermarking game
    • Jun
    • A. Cohen and A. Lapidoth, "The Gaussian watermarking game," IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1639-1667, Jun. 2002.
    • (2002) IEEE Trans. Inf. Theory , vol.48 , Issue.6 , pp. 1639-1667
    • Cohen, A.1    Lapidoth, A.2
  • 9
    • 0034844812 scopus 로고    scopus 로고
    • The capacity of the vector Gaussian watermarking game
    • Washington, DC, Jun
    • A. Cohen and A. Lapidoth, "The capacity of the vector Gaussian watermarking game," in Proc. IEEE Int. Symp. Information Theory, Washington, DC, Jun. 2001, p. 5.
    • (2001) Proc. IEEE Int. Symp. Information Theory , pp. 5
    • Cohen, A.1    Lapidoth, A.2
  • 10
    • 2942685503 scopus 로고    scopus 로고
    • Upper bounds on separating codes
    • Jun
    • G. D. Cohen and H. G. Schaathun, "Upper bounds on separating codes," IEEE Trans. Inf. Theory, vol. 50, no. 6, pp. 1291-1294, Jun. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.6 , pp. 1291-1294
    • Cohen, G.D.1    Schaathun, H.G.2
  • 11
    • 0015565580 scopus 로고
    • Enumerative source coding
    • Jan
    • T. M. Cover, "Enumerative source coding," IEEE Trans. Inf. Theory vol. IT-19, no. 1, pp. 73-77, Jan. 1973.
    • (1973) IEEE Trans. Inf. Theory , vol.IT-19 , Issue.1 , pp. 73-77
    • Cover, T.M.1
  • 13
    • 0000676728 scopus 로고    scopus 로고
    • Combining digital watermarks and collusion secure fingerprints for digital images
    • Oct
    • J. Dittmann, A. Behr, M. Stabenau, P. Schmitt, J. Schwenk, and J. Ueberberg, "Combining digital watermarks and collusion secure fingerprints for digital images," J. Electron. Imag., vol. 9, no. 4, pp. 456-467, Oct. 2000.
    • (2000) J. Electron. Imag , vol.9 , Issue.4 , pp. 456-467
    • Dittmann, J.1    Behr, A.2    Stabenau, M.3    Schmitt, P.4    Schwenk, J.5    Ueberberg, J.6
  • 14
    • 85047690191 scopus 로고
    • The random coding bound is tight for the average code
    • Mar
    • R. G. Gallager, "The random coding bound is tight for the average code," IEEE Trans. Inf. Theory, vol. IT-19, no. 2, pp. 244-246, Mar. 1973.
    • (1973) IEEE Trans. Inf. Theory , vol.IT-19 , Issue.2 , pp. 244-246
    • Gallager, R.G.1
  • 15
    • 0042265652 scopus 로고    scopus 로고
    • A relationship between quantization and watermarking rates in the presence of additive Gaussian attacks information theory
    • Aug
    • D. Karakos and A. Papamarcou, "A relationship between quantization and watermarking rates in the presence of additive Gaussian attacks information theory," IEEE Trans. Inf. Theory, vol. 49, no. 8, pp. 1970-1982, Aug. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.8 , pp. 1970-1982
    • Karakos, D.1    Papamarcou, A.2
  • 17
    • 0030105189 scopus 로고    scopus 로고
    • A new universal random coding bound for the multiple access channel
    • Mar
    • Y. S. Liu and B. L. Hughes, "A new universal random coding bound for the multiple access channel," IEEE Trans. Inf. Theory, vol. 42, no. 2, pp. 376-386, Mar. 1996.
    • (1996) IEEE Trans. Inf. Theory , vol.42 , Issue.2 , pp. 376-386
    • Liu, Y.S.1    Hughes, B.L.2
  • 18
    • 15044347861 scopus 로고    scopus 로고
    • Codes for Digital Fingerprints,
    • Ph.D. dissertation, Dept. Elec. Eng, Linköping Univ, Linköping, Sweden, Jun
    • J. Löfvenberg, "Codes for Digital Fingerprints," Ph.D. dissertation, Dept. Elec. Eng., Linköping Univ., Linköping, Sweden, Jun. 2001.
    • (2001)
    • Löfvenberg, J.1
  • 19
    • 34248324803 scopus 로고    scopus 로고
    • Random codes for Digital Finger-printing Dept. Elec. Eng., Linköping Univ., Linköping, Sweden, Rep. Reg nr:LITH-ISY-R-2059
    • Jun
    • J. Löfvenberg and N. Wilberg, Random codes for Digital Finger-printing Dept. Elec. Eng., Linköping Univ., Linköping, Sweden, Rep. Reg nr:LITH-ISY-R-2059, Jun. 2001.
    • (2001)
    • Löfvenberg, J.1    Wilberg, N.2
  • 20
    • 0033871878 scopus 로고    scopus 로고
    • On random coding error exponents of watermarking systems
    • Mar
    • N. Merhav, "On random coding error exponents of watermarking systems," IEEE Trans. Inf Theory, vol. 46, no. 2, pp. 420-430, Mar. 2000.
    • (2000) IEEE Trans. Inf Theory , vol.46 , Issue.2 , pp. 420-430
    • Merhav, N.1
  • 22
    • 1442313262 scopus 로고    scopus 로고
    • The parallel-Gaussian watermarking game
    • Feb
    • P. Moulin and M. K. Mihcak, "The parallel-Gaussian watermarking game," IEEE Trans. Inf. Theory, vol. 50, no. 2, pp. 272-289, Feb. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.2 , pp. 272-289
    • Moulin, P.1    Mihcak, M.K.2
  • 23
    • 0034449758 scopus 로고    scopus 로고
    • Information-theoretic analysis of information hiding
    • Sorrento, Italy, Jun
    • P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," in Proc. IEEE Int. Symp. Information Theory, Sorrento, Italy, Jun. 2000, p. 19.
    • (2000) Proc. IEEE Int. Symp. Information Theory , pp. 19
    • Moulin, P.1    O'Sullivan, J.A.2
  • 24
    • 0037353686 scopus 로고    scopus 로고
    • Information-theoretic analysis of information hiding
    • Mar
    • P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.3 , pp. 563-593
    • Moulin, P.1    O'Sullivan, J.A.2
  • 26
    • 0037516820 scopus 로고    scopus 로고
    • S. S. Pradhan, J. Chou, and K. Ramchandran, Duality between source coding and channel coding and its extension to the side information case, IEEE Trans. Inf. Theory, 49, no. 5, pp. 1181-1203, May 2003.
    • S. S. Pradhan, J. Chou, and K. Ramchandran, "Duality between source coding and channel coding and its extension to the side information case," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1181-1203, May 2003.
  • 27
    • 84959043688 scopus 로고    scopus 로고
    • Collusion secure q-ary fingerprinting for perceptual content
    • Digital Rights ManagementWorkshop , T. Sander, Ed. Berlin, Germany: Springer-Verlag
    • R. Safavi-Naini and Y. Wang, "Collusion secure q-ary fingerprinting for perceptual content," in Digital Rights ManagementWorkshop (Lecture Notes in Computer Science), T. Sander, Ed. Berlin, Germany: Springer-Verlag, 2002, vol. 2320, pp. 57-75.
    • (2002) Lecture Notes in Computer Science , vol.2320 , pp. 57-75
    • Safavi-Naini, R.1    Wang, Y.2
  • 28
    • 0038192132 scopus 로고    scopus 로고
    • Sequential traitor tracing
    • May
    • R. Safavi-Naini and Y.Wang, "Sequential traitor tracing," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1319-1326, May 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.5 , pp. 1319-1326
    • Safavi-Naini, R.1    Wang, Y.2
  • 29
    • 5044248629 scopus 로고    scopus 로고
    • Communication over an Unknown Channel Via Common Broadcasting,
    • Ph.D. dissertation, Tel-Aviv Univ, Tel-Aviv, Israel
    • N. Shulman, "Communication over an Unknown Channel Via Common Broadcasting," Ph.D. dissertation, Tel-Aviv Univ., Tel-Aviv, Israel, 2003.
    • (2003)
    • Shulman, N.1
  • 30
    • 0038530774 scopus 로고    scopus 로고
    • Application of list decoding to tracing traitors
    • May
    • A. Silverberg, J. Staddon, and J. L. Walker, "Application of list decoding to tracing traitors," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1312-1318, May 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.5 , pp. 1312-1318
    • Silverberg, A.1    Staddon, J.2    Walker, J.L.3
  • 31
    • 0037353685 scopus 로고    scopus 로고
    • On the error exponent and capacity games of private watermarking systems
    • Mar
    • A. Somekh-Baruch and N. Merhav, "On the error exponent and capacity games of private watermarking systems," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 537-562, Mar. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.3 , pp. 537-562
    • Somekh-Baruch, A.1    Merhav, N.2
  • 32
    • 1842481655 scopus 로고    scopus 로고
    • On the capacity game of public watermarking systems
    • Mar
    • A. Somekh-Baruch and N. Merhav, "On the capacity game of public watermarking systems," IEEE Trans. Inf. Theory, vol. 50, no. 3, pp. 511-524, Mar. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.3 , pp. 511-524
    • Somekh-Baruch, A.1    Merhav, N.2
  • 33
    • 15044340426 scopus 로고    scopus 로고
    • On the capacity game of private fingerprinting systems under collusion attacks
    • Mar
    • A. Somekh-Baruch and N. Merhav, "On the capacity game of private fingerprinting systems under collusion attacks," IEEE Trans. Inf. Theory, vol. 51, no. 3, pp. 884-899, Mar. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.3 , pp. 884-899
    • Somekh-Baruch, A.1    Merhav, N.2
  • 34
    • 0035334148 scopus 로고    scopus 로고
    • Identification in the presence of side information with application to watermarking
    • May
    • Y. Steinberg and N. Merhav, "Identification in the presence of side information with application to watermarking," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1410-1422, May 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.4 , pp. 1410-1422
    • Steinberg, Y.1    Merhav, N.2
  • 37
    • 39049134843 scopus 로고    scopus 로고
    • Capacity and random-coding error exponent for public fingerprinting game
    • Seattle, WA, Jul
    • Y. Wang and P. Moulin, "Capacity and random-coding error exponent for public fingerprinting game," in Proc. IEEE Int. Symp. Information Theory, Seattle, WA, Jul. 2007, pp. 1174-1178.
    • (2007) Proc. IEEE Int. Symp. Information Theory , pp. 1174-1178
    • Wang, Y.1    Moulin, P.2
  • 38
    • 0036847453 scopus 로고    scopus 로고
    • Asymptotic bounds on frameproof codes
    • Nov
    • C. Xing, "Asymptotic bounds on frameproof codes," IEEE Trans. Inf. Theory, vol. 48, no. 11, pp. 2991-2995, Nov. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.48 , Issue.11 , pp. 2991-2995
    • Xing, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.