首页> 外文会议>IEEE International Workshop on Information Forensics and Security >WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES
【24h】

WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES

机译:对二元概率追踪追踪代码的最坏情况

获取原文

摘要

This article deals with traitor tracing which is also known as active fingerprinting, content serialization, or user forensics. We study the impact of worst case attacks on the well-known Tardos binary probabilistic traitor tracing code, and especially its optimum setups recently advised by Amiri and Tardos, and by Huang and Moulin. This paper assesses that these optimum setups are robust in the sense that a discrepancy between the foreseen numbers of colluders and its actual value doesn't spoil the achievable rate of a joint decoder. On the other hand, this discrepancy might have a dramatic impact on a simple decoder. Since the complexity of the today's joint decoder is prohibitive, this paper mitigates the impact of the optimum setups in current realizable schemes.
机译:本文处理叛徒跟踪,也称为有源指纹,内容序列化或用户取证。我们研究最坏情况攻击对众所周知的Tardos二进制概率追踪追踪代码的影响,特别是其最近由Amiri和Tardos建议的最佳设置,以及黄和莫林建议。本文评估了这些最佳设置在预见的勾结器和其实际值之间的差异和其实际值之间的差异不会破坏联合解码器的可实现速率。另一方面,这种差异可能对简单的解码器产生剧烈影响。由于今天的联合解码器的复杂性令人望而却步,因此本文减轻了最佳设置在最新的方案中的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号