Presentation 2013-05-24
Coding Theorems on a Probabilistic Digital Fingerprinting Code under the Symmetry of Malicious Users
Hiroki KOGA, Kazuya KOYANO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Digital fingerprinting codes are embedded in licenced digital contents for preventing illegal distribution by malicious users. Digital fingerprinting codes are usually required to have the ability to specify a part (or all) of a collusion of malicious users that generates the pirated copy. In this paper we consider a information-theoretic model of the digital fingerprinting code and characterize the maximum rate of the users (the capacity of the digital fingerprinting code) such that all the malicious users in a collusion can be specified under a certain assumption. In our model, codewords of length n are independently generated subject to a certain probability distribution. In addition, a collusion of size at most u generates an illegal codeword subject to a conditional probability distribution independently. We show that the error probability P_n goes to zero as n→∞ if the rate is less than the capacity, and the rate is less than or equal to the capacity if P_n goes to zero as n→∞ under certain assumptions including the symmetry of the conditional probability distribution.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Digital fingerprinting code / collusion-resistant code / pirated copy / coding theorem
Paper # IT2013-4
Date of Issue

Conference Information
Committee IT
Conference Date 2013/5/17(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Theory (IT)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Coding Theorems on a Probabilistic Digital Fingerprinting Code under the Symmetry of Malicious Users
Sub Title (in English)
Keyword(1) Digital fingerprinting code
Keyword(2) collusion-resistant code
Keyword(3) pirated copy
Keyword(4) coding theorem
1st Author's Name Hiroki KOGA
1st Author's Affiliation Graduate School of Systems and Information Engineering, University of Tsukuba()
2nd Author's Name Kazuya KOYANO
2nd Author's Affiliation Graduate School of Systems and Information Engineering, University of Tsukuba
Date 2013-05-24
Paper # IT2013-4
Volume (vol) vol.113
Number (no) 58
Page pp.pp.-
#Pages 6
Date of Issue