Proceedings of the 11th ACM Workshop on Multimedia and Security 2009
DOI: 10.1145/1597817.1597835
|View full text |Cite
|
Sign up to set email alerts
|

EM decoding of tardos traitor tracing codes

Abstract: This paper proposes a major shift in the decoding of probabilistic Tardos traitor tracing code. The goal of the decoder is to accuse colluders but it ignores how they have been mixing their copies in order to forge the pirated content. As originally proposed by Tardos, so far proposed decoders are agnostic and their performances are stable with respect to this unknown collusion attack. However, this stability automatically leads to non-optimality from a detection theory perspective. This is the reason why this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
55
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(55 citation statements)
references
References 15 publications
0
55
0
Order By: Relevance
“…However the method used to select suspicious users in this paper is suboptimal from a hypothesis testing view-point, our future works will be concerned in integrating more efficient tracing decoders. 5 …”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…However the method used to select suspicious users in this paper is suboptimal from a hypothesis testing view-point, our future works will be concerned in integrating more efficient tracing decoders. 5 …”
Section: Resultsmentioning
confidence: 99%
“…We used the mathematical model presented in Ref. 5. In this model four assumptions must be respected about the collusion channel :…”
Section: Collusionmentioning
confidence: 99%
“…The seminal work of probabilistic or bias-based fingerprinting codes is the well known Tardos Codes introduced by Tardos [19] proving that a fingerprinting scheme must satisfy l ∝ c 2 ln nε −1 1 for a large number of fingerprints n, with code length l, number of colluders c and upper bound on the probability of accusing a specific innocent ε1. It followed a long list of descendants, that proposed optimizations by sharpening the bounds ( [22], [15], [16], [9]), improving the distribution function ( [5], [1], 1 For binary fingerprints, both models are equal [7]) or introducing a more discriminative or practical accusation score function ( [20], [10], [6], [17]). …”
Section: Related Workmentioning
confidence: 99%
“…We follow the idea of Furon and Pérez-Freire [6] who made use of the Expectation-Maximization (EM) algorithm inside the decoder. Whereas [6] used the EM in order to gain knowledge of the collusion attack strategy, we focus on the accusation scores.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation