WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2009

WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES

Résumé

This article deals with traitor tracing which is also known as active fingerprinting, content serialization, or user forensics. We study the impact of worst case attacks on the well-known Tardos binary prob- abilistic traitor tracing code, and especially its optimum setups re- cently advised by Amiri and Tardos, and by Huang and Moulin. This paper assesses that these optimum setups are robust in the sense that a discrepancy between the foreseen numbers of colluders and the its actual value doesn't spoil the achievable rate of a joint decoder. On the other hand, this discrepancy might have a dramatic impact on a single decoder. Since the complexity of the today's joint decoder is prohibitive, this paper mitigates the interest of the optimum setups.
Fichier principal
Vignette du fichier
worst_case_conf.pdf (115.1 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

inria-00505886 , version 1 (26-07-2010)

Identifiants

  • HAL Id : inria-00505886 , version 1

Citer

Teddy Furon, Luis Pérez-Freire. WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES. IEEE International Workshop on Information Forensics and Security, Dec 2009, London, United Kingdom. ⟨inria-00505886⟩
178 Consultations
137 Téléchargements

Partager

Gmail Facebook X LinkedIn More