DocumentCode :
3207359
Title :
Worst case attacks against binary probabilistic traitor tracing codes
Author :
Furon, Teddy ; Pérez-Freire, Luis
Author_Institution :
Thomson Security Competence Center, Cesson-Sevigne, France
fYear :
2009
fDate :
6-9 Dec. 2009
Firstpage :
56
Lastpage :
60
Abstract :
This article deals with traitor tracing which is also known as active fingerprinting, content serialization, or user forensics. We study the impact of worst case attacks on the well-known Tardos binary probabilistic traitor tracing code, and especially its optimum setups recently advised by Amiri and Tardos, and by Huang and Moulin. This paper assesses that these optimum setups are robust in the sense that a discrepancy between the foreseen numbers of colluders and its actual value doesn´t spoil the achievable rate of a joint decoder. On the other hand, this discrepancy might have a dramatic impact on a simple decoder. Since the complexity of the today´s joint decoder is prohibitive, this paper mitigates the impact of the optimum setups in current realizable schemes.
Keywords :
binary codes; cryptography; Tardos binary probabilistic traitor tracing codes; active fingerprinting; content serialization; user forensics; worst case attacks; Computer aided software engineering; Data security; Decoding; Fingerprint recognition; Forensics; Game theory; Mutual information; Robustness; Telecommunication standards; Time sharing computer systems; Tardos codes; Traitor tracing; achievable rate; worst case attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on
Conference_Location :
London
Print_ISBN :
978-1-4244-5279-8
Electronic_ISBN :
978-1-4244-5280-4
Type :
conf
DOI :
10.1109/WIFS.2009.5386484
Filename :
5386484
Link To Document :
بازگشت