|
Volumn 54, Issue 8, 2008, Pages 3663-3676
|
Tardos fingerprinting is better than we thought
|
Author keywords
Approximation methods; Coalition; collusion; Color; Complexity theory; Computational modeling; Couplings; Data security; Distribution functions; Encoding; Error probability; Fingerprint recognition; Fingerprinting; Industries; Music; Numerical models; Object recognition; Peer to peer computing; Permission; Random code; Random variables; Resistance; Security; Stochastic processes; Traitor tracing; watermark; Watermarking; Writing
|
Indexed keywords
CODES (SYMBOLS);
ELECTRIC CURRENTS;
ERROR ANALYSIS;
LEARNING SYSTEMS;
APPROXIMATION METHODS;
COALITION;
CODE LENGTHS;
COLLUSION;
COLLUSION ATTACKS;
COLOR;
COMPLEXITY THEORY;
COMPUTATIONAL MODELING;
CONTENT DISTRIBUTIONS;
COUPLINGS;
DATA SECURITY;
DISTRIBUTION FUNCTIONS;
ENCODING;
ERROR PROBABILITY;
ERROR RATES;
FALSE NEGATIVES;
FALSE POSITIVE;
FINGERPRINT RECOGNITION;
FINGERPRINTING;
GAUSSIAN;
INDUSTRIES;
MUSIC;
NUMERICAL MODELS;
OBJECT RECOGNITION;
PEER TO PEER COMPUTING;
PERMISSION;
PROVABLY SECURE;
RANDOM CODE;
RANDOM VARIABLES;
RESISTANCE;
SECURITY;
STATISTICAL PROPERTIES;
STOCHASTIC PROCESSES;
STOCHASTIC VARIABLES;
TRAITOR TRACING;
WATERMARK;
WATERMARKING;
WRITING;
CODES (STANDARDS);
|
EID: 48849090055
PISSN: 00189448
EISSN: None
Source Type: Journal
DOI: 10.1109/TIT.2008.926307 Document Type: Article |
Times cited : (74)
|
References (12)
|