Sciweavers

43 search results - page 1 / 9
» Optimal probabilistic fingerprint codes
Sort
View
STOC
2003
ACM
142views Algorithms» more  STOC 2003»
14 years 4 months ago
Optimal probabilistic fingerprint codes
We construct binary codes for fingerprinting. Our codes for n users that are -secure against c pirates have length O(c2 log(n/ )). This improves the codes proposed by Boneh and Sh...
Gábor Tardos
ICIP
2010
IEEE
13 years 2 months ago
Spread spectrum-based watermarking for Tardos code-based fingerprinting for H.264/AVC video
In this paper, we present a novel approach for active fingerprinting of state of the art video codec H.264/AVC. Tardos probabilistic fingerprinting code is embedded in H.264/AVC v...
Zafar Shahid, Marc Chaumont, William Puech
IH
2010
Springer
13 years 2 months ago
Short Collusion-Secure Fingerprint Codes against Three Pirates
In this article, we propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. Our pira...
Koji Nuida
ICASSP
2008
IEEE
13 years 11 months ago
Towards optimal design of signal fingerprinting codes
Digital fingerprinting aims at protecting multimedia contents from illegal redistribution by embedding imperceptible fingerprints identifying the users. We propose two approache...
Jean-Francois Jourdas, Pierre Moulin
IH
2009
Springer
13 years 11 months ago
Estimating the Minimal Length of Tardos Code
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Teddy Furon, Luis Pérez-Freire, Arnaud Guya...