Presentation 2014-03-11
On the Performance of Probabilistic Digital Fingerprinting Codes Generated from Nonstationary Distribution
Kouhei KANAI, Hiroki KOGA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Illegal copies of digital contents are spreading due to the development of the Internet. Digital finger-printing codes provide a method in which we can identify malicious users who generate illegal copies under the collusion attack. In this paper we discuss performance of a probabilistic digital fingerprinting code in which codewords are generated according to a certain probability distribution. Although we often use such i.i.d. codewords in digital fingerprinting codes, there also exists a digital fingerprinting code such as the Tardos code where the codewords are generated according to a varying distribution. In this paper, we use a tracing algorithm based on the marking assumption and evaluate the probability of misidentification of a collusion of two malicious users. We show the existence of the situation where a digital fingerprinting code generated from a nonstationary distribution outperforms a digital fingerprinting code generated from a fixed stationary distribution.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) digital fingerprinting code / marking assumption / pirated copy
Paper # IT2013-94,ISEC2013-123,WBS2013-83
Date of Issue

Conference Information
Committee ISEC
Conference Date 2014/3/3(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) On the Performance of Probabilistic Digital Fingerprinting Codes Generated from Nonstationary Distribution
Sub Title (in English)
Keyword(1) digital fingerprinting code
Keyword(2) marking assumption
Keyword(3) pirated copy
1st Author's Name Kouhei KANAI
1st Author's Affiliation Graduate School of Systems and Information Engineering, University of Tsukuba()
2nd Author's Name Hiroki KOGA
2nd Author's Affiliation Graduate School of Systems and Information Engineering, University of Tsukuba
Date 2014-03-11
Paper # IT2013-94,ISEC2013-123,WBS2013-83
Volume (vol) vol.113
Number (no) 484
Page pp.pp.-
#Pages 6
Date of Issue