메뉴 건너뛰기




Volumn 4, Issue 3, 2009, Pages 293-301

Performance of orthogonal fingerprinting codes under worst-case noise

Author keywords

Collusion attacks; Fingerprinting; Noise

Indexed keywords

COLLUDERS; COLLUSION ATTACKS; ERROR EXPONENT; ERROR PROBABILITIES; FINGERPRINTING; FINGERPRINTING CODE; NOISE; NOISE DISTRIBUTION; NOISE SEQUENCE; SPHERICAL CODES; WORST-CASE NOISE;

EID: 69749101534     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2009.2026462     Document Type: Article
Times cited : (13)

References (18)
  • 1
    • 0037353686 scopus 로고    scopus 로고
    • Information-theoretic analysis of information hiding
    • Mar.
    • P. Moulin and J. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol.49, no.3, pp. 563-593, Mar. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.3 , pp. 563-593
    • Moulin, P.1    O'Sullivan, J.2
  • 2
    • 15044340426 scopus 로고    scopus 로고
    • On the capacity game of private fingerprinting systems under collusion attacks
    • Mar.
    • A. Somekh-Baruch and N. Merhav, "On the capacity game of private fingerprinting systems under collusion attacks," IEEE Trans. Inf. Theory, vol.51, no.3, pp. 884-899, Mar. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.3 , pp. 884-899
    • Somekh-Baruch, A.1    Merhav, N.2
  • 3
    • 34248357288 scopus 로고    scopus 로고
    • Achievable error exponents for the private fingerprinting games
    • May
    • A. Somekh-Baruch and N. Merhav, "Achievable error exponents for the private fingerprinting games," IEEE Trans. Inf. Theory, vol.53, no.5, pp. 1827-1838, May 2007.
    • (2007) IEEE Trans. Inf. Theory , vol.53 , Issue.5 , pp. 1827-1838
    • Somekh-Baruch, A.1    Merhav, N.2
  • 4
    • 39049134843 scopus 로고    scopus 로고
    • Capacity and random-coding error exponent for public fingerprinting game
    • Seattle, WA, Jul.
    • Y. Wang and P. Moulin, "Capacity and random-coding error exponent for public fingerprinting game," in IEEE Int. Symp. Information Theory, Seattle, WA, Jul. 2006.
    • (2006) IEEE Int. Symp. Information Theory
    • Wang, Y.1    Moulin, P.2
  • 5
    • 69749105379 scopus 로고    scopus 로고
    • Universal fingerprinting: Capacity and random-coding exponents
    • Available from arxiv:0801.3837v2 [cs.IT], submitted for publication
    • P. Moulin, "Universal fingerprinting: Capacity and random-coding exponents," IEEE Trans. Inf. Theory, Available from arxiv:0801.3837v2 [cs.IT], submitted for publication.
    • IEEE Trans. Inf. Theory
    • Moulin, P.1
  • 10
    • 20444373301 scopus 로고    scopus 로고
    • Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
    • Z. Wang, M. Wu, H. Zhao, W. Trappe, and K. Liu, "Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation," IEEE Trans. Image Process., vol.14, no.6, pp. 804-821, 2005.
    • (2005) IEEE Trans. Image Process , vol.14 , Issue.6 , pp. 804-821
    • Wang, Z.1    Wu, M.2    Zhao, H.3    Trappe, W.4    Liu, K.5
  • 11
    • 33646173834 scopus 로고    scopus 로고
    • Regular simplex fingerprints and their op-timality properties
    • Siena, Italy
    • N. Kiyavash and P. Moulin, "Regular simplex fingerprints and their op-timality properties," in Int. Workshop Digital Watermarking (IWDW), Siena, Italy, 2005, pp. 97-109.
    • (2005) Int. Workshop Digital Watermarking (IWDW) , pp. 97-109
    • Kiyavash, N.1    Moulin, P.2
  • 12
    • 44049106752 scopus 로고    scopus 로고
    • A framework for optimizing nonlinear collusion attacks on fingerprinting systems
    • Mar.
    • N. Kiyavash and P. Moulin, "A framework for optimizing nonlinear collusion attacks on fingerprinting systems," in Conf. Information Sciences and Systems (CISS'06), Mar. 2006, pp. 1170-1175.
    • (2006) Conf. Information Sciences and Systems (CISS'06) , pp. 1170-1175
    • Kiyavash, N.1    Moulin, P.2
  • 17
    • 84907062399 scopus 로고
    • Probability of error for optimal codes in a {G}aussian channel
    • C. Shannon, "Probability of error for optimal codes in a {G}aussian channel," Bell Syst. Tech. J., vol.38, no.3, pp. 611-657, 1959.
    • (1959) Bell Syst. Tech. J. , vol.38 , Issue.3 , pp. 611-657
    • Shannon, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.