Paper
19 February 2014 Tuple decoders for traitor tracing schemes
Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
Author Affiliations +
Proceedings Volume 9028, Media Watermarking, Security, and Forensics 2014; 90280C (2014) https://doi.org/10.1117/12.2037659
Event: IS&T/SPIE Electronic Imaging, 2014, San Francisco, California, United States
Abstract
In the field of collusion-resistant traitor tracing, Oosterwijk et al. recently determined the optimal suspicion function for simple decoders. Earlier, Moulin also considered another type of decoder: the generic joint decoder that compares all possible coalitions, and showed that usually the generic joint decoder outperforms the simple decoder. Both Amiri and Tardos, and Meerwald and Furon described constructions that assign suspicion levels to c-tuples, where c is the number of colluders. We investigate a novel idea: the tuple decoder, assigning a suspicion level to tuples of a fixed size. In contrast to earlier work, we use this in a novel accusation algorithm to decide for each distinct user whether or not to accuse him. We expect such a scheme to outperform simple decoders while not being as computationally intensive as the generic joint decoder. In this paper we generalize the optimal suspicion functions to tuples, and describe a family of accusation algorithms in this setting that accuses individual users using this tuple-based information.
© (2014) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jan-Jaap Oosterwijk, Jeroen Doumen, and Thijs Laarhoven "Tuple decoders for traitor tracing schemes", Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014, 90280C (19 February 2014); https://doi.org/10.1117/12.2037659
Lens.org Logo
CITATIONS
Cited by 5 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Binary data

Code division multiplexing

Defense and security

Sensors

Expectation maximization algorithms

Forensic science

RELATED CONTENT


Back to Top