Pattern Recognition and Machine Learning (Information Science and Statistics)
Pattern Recognition and Machine Learning (Information Science and Statistics)
Optimal probabilistic fingerprint codes
Journal of the ACM (JACM)
On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes
Information Hiding
An improvement of discrete Tardos fingerprinting codes
Designs, Codes and Cryptography
EM decoding of tardos traitor tracing codes
Proceedings of the 11th ACM workshop on Multimedia and security
Estimating the Minimal Length of Tardos Code
Information Hiding
Optimization of Tardos's fingerprinting codes in a viewpoint of memory amount
IH'07 Proceedings of the 9th international conference on Information hiding
Experimental assessment of probabilistic fingerprinting codes over AWGN channel
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Tardos's fingerprinting code over AWGN channel
IH'10 Proceedings of the 12th international conference on Information hiding
Tardos Fingerprinting is Better Than We Thought
IEEE Transactions on Information Theory
Asymptotic fingerprinting capacity in the combined digit model
IH'12 Proceedings of the 14th international conference on Information Hiding
Bias equalizer for binary probabilistic fingerprinting codes
IH'12 Proceedings of the 14th international conference on Information Hiding
A simple tracing algorithm for binary fingerprinting code under averaging attack
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
The performance of fingerprinting codes has been studied under the well-known marking assumption. In a realistic environment, however, a pirated copy will be distorted by an additional attack. Under the assumption that the distortion is modeled as AWGN, a soft decision method for a tracing algorithm has been proposed and the traceability has been experimentally evaluated. However, the previous soft decision method works directly with a received signal without considering the communication theory. In this study, we calculate the likelihood of received signal considering a posterior probability, and propose a soft decision tracing algorithm considering the characteristic of Gaussian channel. For the estimation of channel, we employ the expectation-maximization algorithm by giving constraints under the possible collusion strategies. We also propose an equalizer to give a proper weighting parameter for calculating a correlation score.