Binary Codes for Collusion-Secure Fingerprinting
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A 2-Secure Code with Efficient Tracing Algorithm
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Efficient Traitor Tracing Algorithms Using List Decoding
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Collusion Secure q-ary Fingerprinting for Perceptual Content
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Optimal probabilistic fingerprint codes
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
An upper bound on the size of a code with the k-identifiable parent property
Journal of Combinatorial Theory Series A
Generalized hashing and parent-identifying codes
Journal of Combinatorial Theory Series A
On a Class of Traceability Codes
Designs, Codes and Cryptography
Soft-Decision Tracing in Fingerprinted Multimedia Content
IEEE MultiMedia
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
On a Bound of Cover-Free Families
Designs, Codes and Cryptography
Designs, Codes and Cryptography
A class of I.P.P. codes with efficient identification
Journal of Complexity - Special issue on coding and cryptography
Traitor tracing for prerecorded and recordable media
Proceedings of the 4th ACM workshop on Digital rights management
New Constructions for IPP Codes
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Building efficient and effective multimedia fingerprints via joint coding and embedding
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Recursive constructions of secure codes and hash families using difference function families
Journal of Combinatorial Theory Series A
Explicit constructions of separating hash families from algebraic curves over finite fields
Designs, Codes and Cryptography
Sliding-window dynamic frameproof codes
Designs, Codes and Cryptography
Sequential and dynamic frameproof codes
Designs, Codes and Cryptography
A unified model for unconditionally secure key distribution
Journal of Computer Security
On optimal codes with w-identifiable parent property
Designs, Codes and Cryptography
Indentity-based broadcast signcryption
Computer Standards & Interfaces
On generalized separating hash families
Journal of Combinatorial Theory Series A
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
Designs, Codes and Cryptography
Optimal probabilistic fingerprint codes
Journal of the ACM (JACM)
Content adaptive watermarking for multimedia fingerprinting
Computer Standards & Interfaces
A bound on the size of separating hash families
Journal of Combinatorial Theory Series A
Collision-Resilient Multi-state Query Tree Protocol for Fast RFID Tag Identification
Computational Intelligence and Security
Adaptive traitor tracing for large anonymous attack
Proceedings of the 8th ACM workshop on Digital rights management
Attack Analysis for He & Wu's Joint Watermarking/Fingerprinting Scheme
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Upper bounds for parent-identifying set systems
Designs, Codes and Cryptography
Defending against the Pirate Evolution Attack
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Tracing and Revoking Pirate Rebroadcasts
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
Traitor Tracing without A Priori Bound on the Coalition Size
ISC '09 Proceedings of the 12th International Conference on Information Security
Fingerprinting with minimum distance decoding
IEEE Transactions on Information Forensics and Security
New traceability codes against a generalized collusion attack for digital fingerprinting
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Shared generation of pseudo-random functions with cumulative maps
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
A note about the traceability properties of linear codes
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Fingerprinting codes for live pay-television broadcast via internet
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
Pirate evolution: how to make the most of your traitor keys
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Defending against the pirate evolution attack
International Journal of Applied Cryptography
Journal of Combinatorial Theory Series A
Collusion-resistant fingerprinting systems: review and recent results
Transactions on data hiding and multimedia security V
Group testing and batch verification
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
Mediated traceable anonymous encryption
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Improving the round complexity of traitor tracing schemes
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Comments on "new results on frame-proof codes and traceability schemes"
IEEE Transactions on Information Theory
Bounds for separating hash families
Journal of Combinatorial Theory Series A
Interleaving embedding scheme for ECC-based multimedia fingerprinting
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Efficient traitor tracing for clone attack in content protection
Proceedings of the 2011 ACM Symposium on Applied Computing
On the effects of pirate evolution on the design of digital content distribution systems
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
Attacking traitor tracing schemes using history recording and abrupt decoders
ISC'11 Proceedings of the 14th international conference on Information security
Generic construction of hybrid public key traitor tracing with full-public-traceability
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Performance study on multimedia fingerprinting employing traceability codes
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Fingerprinting schemes. identifying the guilty sources using side information
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Traitor tracing against powerful attacks using combinatorial designs
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Practical scenarios for the van trung-martirosyan codes
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Practical forensic analysis in advanced access content system
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Tracing traitors by guessing secrets. the q-ary case
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Identification algorithms for sequential traitor tracing
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Worst-case optimal fingerprinting codes for non-threshold collusion
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
A trellis-based bound on (2,1)-separating codes
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Key management for multicast fingerprinting
ICISS'05 Proceedings of the First international conference on Information Systems Security
A collusion attack optimization strategy for digital fingerprinting
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) - Special Issue on Multimedia Security
Renewable traitor tracing: a trace-revoke-trace system for anonymous attack
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Near-Optimal collusion-secure fingerprinting codes for efficiently tracing illegal re-distribution
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking
Proceedings of the first ACM workshop on Information hiding and multimedia security
Improved bounds for separating hash families
Designs, Codes and Cryptography
Hi-index | 754.90 |
In order to protect copyrighted material, codes may be embedded in the content or codes may be associated with the keys used to recover the content. Codes can offer protection by providing some form of traceability (TA) for pirated data. Several researchers have studied different notions of TA and related concepts in previous years. “Strong” versions of TA allow at least one member of a coalition that constructs a “pirate decoder” to be traced. Weaker versions of this concept ensure that no coalition can “frame” a disjoint user or group of users. All these concepts can be formulated as codes having certain combinatorial properties. We study the relationships between the various notions, and we discuss equivalent formulations using structures such as perfect hash families. We use methods from combinatorics and coding theory to provide bounds (necessary conditions) and constructions (sufficient conditions) for the objects of interest