2014 IEEE International Workshop on Information Forensics and Security (WIFS) 2014
DOI: 10.1109/wifs.2014.7084298
|View full text |Cite
|
Sign up to set email alerts
|

Tardos codes for real

Abstract: This paper deals with active fingerprinting a.k.a. traitor tracing where a collusion of dishonest users merges their individual versions of a content to yield a pirated copy. The Tardos codes are one of the most powerful tools to fight against such collusion process by identifying the colluders.Instead of studying as usual the necessary and sufficient code length in a theoretical setup, we adopt the point of view of the practitioner. We call this the operational mode, i.e. a practical setup where a Tardos code… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(23 citation statements)
references
References 13 publications
0
22
0
1
Order By: Relevance
“…(i) Investigate how much performance difference there is between (20) and the score that would be obtained if the finitec saddlepoint is substituted into Theorem 1; (ii) More elaborate simulations (for many combinations of q, c, c 0 , , n, and attack strategy) to study the difference between the various decoders; (iii) Get a tighter bound on the FP, e.g. using techniques from [12]; (iv) Use the method of Simone andŠkorić [32] to determine the full probability distribution of the score (48) (20) and set the accusation threshold as where the expectation is over the 'innocent' part of the matrix x. We write S j i as in (35).…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…(i) Investigate how much performance difference there is between (20) and the score that would be obtained if the finitec saddlepoint is substituted into Theorem 1; (ii) More elaborate simulations (for many combinations of q, c, c 0 , , n, and attack strategy) to study the difference between the various decoders; (iii) Get a tighter bound on the FP, e.g. using techniques from [12]; (iv) Use the method of Simone andŠkorić [32] to determine the full probability distribution of the score (48) (20) and set the accusation threshold as where the expectation is over the 'innocent' part of the matrix x. We write S j i as in (35).…”
Section: Discussionmentioning
confidence: 99%
“…Such an occurence allows for errorless decoding. Then we upper-bound the False Positive error rate using an approach similar to the 'operational mode' that was recently proposed by Furon and Desoubeaux [12]. We show that there is quite a large gap between this bound and error rates in simulations.…”
Section: B Contributions and Outlinementioning
confidence: 92%
See 2 more Smart Citations
“…scaling logarithmically in the often large number of users n, and quarticly in the number of colluders c. The milestone work of Tardos [40] later improved upon this with a code length ℓ = O(c 2 log n), and he proved that this quadratic scaling in c is optimal. Later work focused on bringing down the leading constants in Tardos' scheme [8,15,16,19,30,32,38,39], leading to an optimal code length of ℓ ∝ 1 2 π 2 c 2 ln n for the original (symmetric) Tardos score function [24,25,37], and an optimal overall code length of ℓ ∝ 2c 2 ln n when using further improved decoders [12,15,21,32,33].…”
Section: Related Workmentioning
confidence: 99%