False Negative probabilities in Tardos codes
نویسندگان
چکیده
Forensic watermarking is the application of digital watermarks for the purpose of tracing unauthorized redistribution of content. One of the most powerful types of attack on watermarks is the collusion attack, in which multiple users compare their differently watermarked versions of the same content. Collusion-resistant codes have been developed against these attacks. One of the most famous such codes is the Tardos code. It has the asymptotically optimal property that it can resist c attackers with a code of length proportional to c2. Determining error rates for the Tardos code and its various extensions and generalizations turns out to be a nontrivial problem. In recent work we developed an approach called the convolution and series expansion (CSE) method to accurately compute false positive accusation probabilities. In this paper we extend the CSE method in order to make it possible to compute a bound on the False Negative accusation probabilities.
منابع مشابه
False positive probabilities in q-ary Tardos codes: comparison of attacks
We investigate False Positive (FP) accusation probabilities for q-ary Tardos codes in the Restricted Digit Model. We employ a computation method recently introduced by us, to which we refer as Convolution and Series Expansion (CSE). We present a comparison of several collusion attacks on q-ary codes: majority voting, minority voting, Interleaving, μ̃-minimizing and Random Symbol (the q-ary equiv...
متن کاملAsymptotically False-Positive-Maximizing Attack on Non-binary Tardos Codes
We use a method recently introduced by Simone and Škorić to study accusation probabilities for non-binary Tardos fingerprinting codes. We generalize the pre-computation steps in this approach to include a broad class of collusion attack strategies. We analytically derive properties of a special attack that asymptotically maximizes false accusation probabilities. We present numerical results on ...
متن کاملAccusation probabilities in Tardos codes: beyond the Gaussian approximation
We study the probability distribution of user accusations in the q-ary Tardos fingerprinting system under the Marking Assumption, in the restricted digit model. In particular, we look at the applicability of the so-called Gaussian approximation, which states that accusation probabilities tend to the normal distribution when the fingerprinting code is long. We introduce a novel parametrization o...
متن کاملOn the Design and Optimization of Tardos Probabilistic Fingerprinting Codes
G. Tardos [1] was the first to give a construction of a fingerprinting code whose length meets the lowest known bound inO(c log n 1 ). This was a real breakthrough because the construction is very simple. Its efficiency comes from its probabilistic nature. However, although G. Tardos almost gave no argument of his rationale, many parameters of his code are precisely fine-tuned. This paper propo...
متن کاملRiding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
We study the asymptotic-capacity-achieving score function that was recently proposed by Oosterwijk et al. for bias-based traitor tracing codes. For the bias function we choose the Dirichlet distribution with a cutoff. Using Bernstein’s inequality and Bennett’s inequality, we upper bound the false positive and false negative error probabilities. From these bounds we derive sufficient conditions ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Des. Codes Cryptography
دوره 74 شماره
صفحات -
تاریخ انتشار 2012