منابع مشابه
Two-Level Fingerprinting Codes: Non-Trivial Constructions
We extend the concept of two-level fingerprinting codes, introduced by Anthapadmanabhan and Barg (2009) in context of traceability (TA) codes [1], to other types of fingerprinting codes, namely identifiable parent property (IPP) codes, secure-frameproof (SFP) codes, and frameproof (FP) codes. We define and propose the first explicit non-trivial construction for two-level IPP, SFP and FP codes.
متن کاملBiosignatures of Pathogen and Host
In information theory, a signature is characterized by the information content as well as noise statistics of the communication channel. Biosignatures have analogous properties. A biosignature can be associated with a particular attribute of a pathogen or a host. However, the signature may be lost in backgrounds of similar or even identical signals from other sources. In this paper, we highligh...
متن کاملNonphotosynthetic Pigments as Potential Biosignatures
Previous work on possible surface reflectance biosignatures for Earth-like planets has typically focused on analogues to spectral features produced by photosynthetic organisms on Earth, such as the vegetation red edge. Although oxygenic photosynthesis, facilitated by pigments evolved to capture photons, is the dominant metabolism on our planet, pigmentation has evolved for multiple purposes to ...
متن کاملAnonymous Fingerprinting with Direct Non-repudiation
Fingerprinting schemes support copyright protection by enabling the merchant of a data item to identify the original buyer of a redistributed copy. In asymmetric schemes, the merchant can also convince an arbiter of this fact. Anonymous fingerprinting schemes enable buyers to purchase digital items anonymously; however, identification is possible if they redistribute the data item. Recently, a ...
متن کاملAsymptotic Fingerprinting Capacity for Non-binary Alphabets
We compute the channel capacity of non-binary fingerprinting under the Marking Assumption, in the limit of large coalition size c. The solution for the binary case was found by Huang and Moulin. They showed that asymptotically, the capacity is 1/(c2 ln 2), the interleaving attack is optimal and the arcsine distribution is the optimal bias distribution. In this paper we prove that the asymptotic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Astrobiology
سال: 2018
ISSN: 1531-1074,1557-8070
DOI: 10.1089/ast.2017.1712