Turbo codes: principles and applications
Turbo codes: principles and applications
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Fingerprinting Concatenated Codes with Efficient Identification
ISC '02 Proceedings of the 5th International Conference on Information Security
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Error Control Coding, Second Edition
Error Control Coding, Second Edition
Collusion secure convolutional fingerprinting information codes
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
A Digital Fingerprint Coding Based on Turbo Codes
CIS '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security
A family of collusion 2-secure codes
IH'05 Proceedings of the 7th international conference on Information Hiding
IEEE Transactions on Information Theory
Digital fingerprinting codes: problem statements, constructions, identification of traitors
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Since the introduction of turbo codes in 1993, many new applications for this family of codes have been proposed. One of the latest, in the context of digital fingerprinting, is called turbo fingerprinting codes and was proposed by Zhang et al.. The main idea is a new fingerprinting code composed of an outer turbo code and an inner code based on the Boneh-Shaw model. The major contribution of this paper is a new analysis of this new family of codes that shows its drawbacks. These drawbacks must be considered in order to perform a correct design of a turbo fingerprinting scheme otherwise the scheme cannot retrieve the traitor users which is the main goal of digital fingerprinting scheme. Moreover, the identification of these drawbacks allows to discuss an entirely new construction of fingerprinting codes based on turbo codes.