메뉴 건너뛰기




Volumn 54, Issue 6, 2008, Pages 2678-2689

On the fingerprinting capacity under the marking assumption

Author keywords

Channel capacity; Digital fingerprinting; Multipleaccess channel (MAC); Strong converse theorem

Indexed keywords

CODES (STANDARDS); CODES (SYMBOLS); PROGRAMMING THEORY;

EID: 43949135930     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.921859     Document Type: Article
Times cited : (27)

References (17)
  • 1
    • 33746879798 scopus 로고
    • An elementary proof of the strong converse theorem for the multiple-access channel
    • R. Ahlswede, "An elementary proof of the strong converse theorem for the multiple-access channel," J. Combin., Inf. and Syst. Sci., vol. 7, no. 3, pp. 216-230, 1982.
    • (1982) J. Combin., Inf. and Syst. Sci , vol.7 , Issue.3 , pp. 216-230
    • Ahlswede, R.1
  • 2
    • 45249120559 scopus 로고    scopus 로고
    • Codes with the identifiable parent property and the multiple-access channel
    • General Theory of Information Transfer , R. Ahlswede et al, Ed. Berlin, Germany: Springer-Verlag
    • R. Ahlswede and N. Cai, "Codes with the identifiable parent property and the multiple-access channel," in General Theory of Information Transfer (Lecture Notes in Computer Science), R. Ahlswede et al., Ed. Berlin, Germany: Springer-Verlag, 2006, vol. 4123, pp. 249-257.
    • (2006) Lecture Notes in Computer Science , vol.4123 , pp. 249-257
    • Ahlswede, R.1    Cai, N.2
  • 3
    • 9744257021 scopus 로고    scopus 로고
    • New bounds on parent-identifying codes: The case of multiple parents
    • N. Alon and U. Stav, "New bounds on parent-identifying codes: The case of multiple parents," Combin. Probab. Comput., vol. 13, no. 6, pp. 795-807, 2004.
    • (2004) Combin. Probab. Comput , vol.13 , Issue.6 , pp. 795-807
    • Alon, N.1    Stav, U.2
  • 6
    • 0037399342 scopus 로고    scopus 로고
    • Digital fingerprinting codes: Problem statements, constructions, identification of traitors
    • Apr
    • A. Barg, G. R. Blakley, and G. Kabatiansky, "Digital fingerprinting codes: Problem statements, constructions, identification of traitors," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 852-865, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 852-865
    • Barg, A.1    Blakley, G.R.2    Kabatiansky, G.3
  • 7
    • 0001070499 scopus 로고    scopus 로고
    • A hypergraph approach to the identifying parent property: The case of multiple parents
    • A. Barg, G. Cohen, S. Encheva, G. Kabatiansky, and G. Zémor, "A hypergraph approach to the identifying parent property: The case of multiple parents," SIAM J. Discr. Math., vol. 14, no. 3, pp. 423-431, 2001.
    • (2001) SIAM J. Discr. Math , vol.14 , Issue.3 , pp. 423-431
    • Barg, A.1    Cohen, G.2    Encheva, S.3    Kabatiansky, G.4    Zémor, G.5
  • 8
    • 0037692013 scopus 로고    scopus 로고
    • An upper bound on the size of a code with the κ-identifiable property
    • S. R. Blackburn, "An upper bound on the size of a code with the κ-identifiable property," J. Combinat. Theory Ser. A, vol. 102, pp. 179-185, 2003.
    • (2003) J. Combinat. Theory Ser. A , vol.102 , pp. 179-185
    • Blackburn, S.R.1
  • 9
    • 5044245035 scopus 로고    scopus 로고
    • Random coding technique for digital fingerprinting codes: Fighting two pirates revisited
    • Chicago, IL, Jun./Jul
    • G. R. Blakley and G. Kabatiansky, "Random coding technique for digital fingerprinting codes: Fighting two pirates revisited," in Proc. IEEE Int. Symp. Information Theory (ISIT 2004), Chicago, IL, Jun./Jul. 2004, pp. 203-203.
    • (2004) Proc. IEEE Int. Symp. Information Theory (ISIT 2004) , pp. 203-203
    • Blakley, G.R.1    Kabatiansky, G.2
  • 10
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Sep
    • D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 14
    • 0037353686 scopus 로고    scopus 로고
    • Information-theoretic analysis of information hiding
    • Mar
    • P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.3 , pp. 563-593
    • Moulin, P.1    O'Sullivan, J.A.2
  • 15
    • 15044340426 scopus 로고    scopus 로고
    • On the capacity game of private fingerprinting systems under collusion attacks
    • Mar
    • A. Somekh-Baruch and N. Merhav, "On the capacity game of private fingerprinting systems under collusion attacks," IEEE Trans. Inf. Theory, vol. 51, no. 3, pp. 884-899, Mar. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.3 , pp. 884-899
    • Somekh-Baruch, A.1    Merhav, N.2
  • 16
    • 0035270516 scopus 로고    scopus 로고
    • Combinatorial properties of frameproof and traceability codes
    • Mar
    • J. N. Staddon, D. R. Stinson, and R. Wei, "Combinatorial properties of frameproof and traceability codes," IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 1042-1049, Mar. 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.2 , pp. 1042-1049
    • Staddon, J.N.1    Stinson, D.R.2    Wei, R.3
  • 17
    • 0038447029 scopus 로고    scopus 로고
    • J. ACM, Preliminary version in Proc. 35th Annu. Symp. Theory of Computing (STOC 2003)
    • to be published
    • G. Tardos, "Optimal probabilistic fingerprint codes," J. ACM, Preliminary version in Proc. 35th Annu. Symp. Theory of Computing (STOC 2003), pp. 116-125, 2003, to be published.
    • (2003) , pp. 116-125
    • Tardos, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.