scispace - formally typeset
Book ChapterDOI

Fingerprinting Concatenated Codes with Efficient Identification

TLDR
This paper constructs a 2-secure fingerprinting code by concatenating an inner (2,2)-separating code with an outter IPP code and uses a simplified version of the Chase algorithms for the inner code and the Koetter-Vardy soft-decision list decoding algorithm for the outter code.
Abstract
A fingerprinting code is a set of codewords that are embedded in each copy of a digital object, with the purpose of making each copy unique. If the fingerprinting code is c-secure, then the decoding of a pirate word created by a coalition of at most c dishonest users, will expose at least one of the guilty parties. In this paper we construct a 2-secure fingerprinting code by concatenating an inner (2,2)-separating code with an outter IPP code. The particular choice of the codes is such that allows the use of efficient decoding algorithms that correct errors beyond the error correction bound of the code, namely a simplified version of the Chase algorithms for the inner code and the Koetter-Vardy soft-decision list decoding algorithm for the outter code.

read more

Citations
More filters
Journal Article

A Short Random Fingerprinting Code Against a Small Number of Pirates

TL;DR: In this paper, the authors proposed a variant of Tardos code which is practical for various applications against a small number of pirates, which is based on a simple random variable drawn from a small set.
Book ChapterDOI

A short random fingerprinting code against a small number of pirates

TL;DR: A variant of Tardos code which is practical for various applications against a small number of pirates and implies that it makes to implement and to perform a simulation extremely easier than the original one.
Book ChapterDOI

A family of collusion 2-secure codes

TL;DR: Based on equidistant codes, a family of fingerprinting codes is constructed in which the identification of guilty users can be efficiently done using minimum distance decoding.
Book ChapterDOI

An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive

TL;DR: It is demonstrated how to mix those two codes to inherit both of their advantages, and the resulting 2-secure codes have short lengths, and possess the above characteristics whenever the number of pirates is not too large.
Proceedings ArticleDOI

Boneh-Shaw fingerprinting and soft decision decoding

TL;DR: This paper improves the decoding algorithm by using soft output from the inner decoder, and it is shown that this permits using significantly shorter codewords.
References
More filters
Journal ArticleDOI

Class of algorithms for decoding block codes with channel measurement information

TL;DR: It is shown that as the signal-to-noise ratio (SNR) increases, the asymptotic behavior of these decoding algorithms cannot be improved, and computer simulations indicate that even for SNR the performance of a correlation decoder can be approached by relatively simple decoding procedures.
Journal ArticleDOI

Collusion-secure fingerprinting for digital data

TL;DR: This paper discusses methods for assigning code-words for the purpose of fingerprinting digital data, e.g., software, documents, music, and video, and presents a general fingerprinting solution which is secure in the context of collusion.
Journal ArticleDOI

Improved decoding of Reed-Solomon and algebraic-geometry codes

TL;DR: An improved list decoding algorithm for decoding Reed-Solomon codes and alternant codes and algebraic-geometry codes is presented and a solution to a weighted curve-fitting problem is presented, which may be of use in soft-decision decoding algorithms for Reed- Solomon codes.
Journal ArticleDOI

Algebraic soft-decision decoding of Reed-Solomon codes

TL;DR: A polynomial-time soft-decision decoding algorithm for Reed-Solomon codes is developed and it is shown that the asymptotic performance can be approached as closely as desired with a list size that does not depend on the length of the code.
Book ChapterDOI

Collusion-Secure Fingerprinting for Digital Data

TL;DR: In this article, the authors discuss methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images) and present a method to identify unauthorized copies and trace them back to the user.
Related Papers (5)