Combinatorial properties of frameproof and traceability codes

  • Authors:
  • J. N. Staddon;D. R. Stinson;Ruizhong Wei

  • Affiliations:
  • Bell Labs. Res., Palo Alto, CA;-;-

  • Venue:
  • IEEE Transactions on Information Theory
  • Year:
  • 2006

Quantified Score

Hi-index 754.90

Visualization

Abstract

In order to protect copyrighted material, codes may be embedded in the content or codes may be associated with the keys used to recover the content. Codes can offer protection by providing some form of traceability (TA) for pirated data. Several researchers have studied different notions of TA and related concepts in previous years. “Strong” versions of TA allow at least one member of a coalition that constructs a “pirate decoder” to be traced. Weaker versions of this concept ensure that no coalition can “frame” a disjoint user or group of users. All these concepts can be formulated as codes having certain combinatorial properties. We study the relationships between the various notions, and we discuss equivalent formulations using structures such as perfect hash families. We use methods from combinatorics and coding theory to provide bounds (necessary conditions) and constructions (sufficient conditions) for the objects of interest