Advances in Information and Computer Security
DOI: 10.1007/978-3-540-75651-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 21 publications
(19 citation statements)
references
References 12 publications
0
19
0
Order By: Relevance
“…The simplex is an ETF with and . In fact, Kiyavash et al [20] give a derivation for the value of the distance (12) in this case (21) The bound (20) is lower than (21) by a factor of , and for practical cases in which , they are particularly close. Overall, ETF fingerprint design is a natural generalization of the provably optimal simplex design of [20].…”
Section: Theorem 5: Suppose Fingerprintsmentioning
confidence: 91%
“…The simplex is an ETF with and . In fact, Kiyavash et al [20] give a derivation for the value of the distance (12) in this case (21) The bound (20) is lower than (21) by a factor of , and for practical cases in which , they are particularly close. Overall, ETF fingerprint design is a natural generalization of the provably optimal simplex design of [20].…”
Section: Theorem 5: Suppose Fingerprintsmentioning
confidence: 91%
“…In [8,9], the CDMA-based fingerprinting scheme with high robustness against collusion attack has been proposed. In this section, we review the basic idea and the removal operation with two kinds of thresholds.…”
Section: Cdma-based Fingerprintingmentioning
confidence: 99%
“…As a variant of the spread spectrum techniques based on the Cox's method, Hayashi et. al have proposed an hierarchical fingerprinting scheme based on the CDMA technique by combining quasiorthogonal sequences and orthogonal transform [8]. It is possible to assign an unique combination of two kinds of SS sequences to each user; one is for group ID which identifies the group where a user belongs to, and the other is for user ID which represents an individual user in the group.…”
Section: Introductionmentioning
confidence: 99%
“…For the evaluation of the performance, the attack model in [3] and [4] is the combination of averaging attack and JPEG compression with quality factor 35 %. The reason why JPEG compression is used in the simulation is to add a noise under a realistic environment.…”
Section: Problemmentioning
confidence: 99%
“…In order to reduce the computational costs in the conventional spread spectrum fingerprinting schemes, the CDMA-based fingerprinting scheme has been proposed [3]. Different from the random spread spectrum sequence in the conventional schemes, theoretically quasi-orthogonal sequences are designed using a PN sequence combined with orthogonal transform like DCT.…”
Section: Introductionmentioning
confidence: 99%