2012 IEEE International Symposium on Information Theory Proceedings 2012
DOI: 10.1109/isit.2012.6283982
|View full text |Cite
|
Sign up to set email alerts
|

On fingerprinting capacity games for arbitrary alphabets and their asymptotics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
23
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(24 citation statements)
references
References 8 publications
1
23
0
Order By: Relevance
“…• The gap between the simple and joint capacities of the interleaving attack contradicts previous results of Huang and Moulin [24], [25]. As a result, finding the fingerprinting capacity is again an open problem.…”
Section: E Contributions and Outlinementioning
confidence: 83%
“…• The gap between the simple and joint capacities of the interleaving attack contradicts previous results of Huang and Moulin [24], [25]. As a result, finding the fingerprinting capacity is again an open problem.…”
Section: E Contributions and Outlinementioning
confidence: 83%
“…As they further prove the interleaving attack to be the asymptotic optimal attack [8], and as Oosterwijk et al prove the score function in [17] to be the best defense against this attack, the game seemed solved 2 . In [16], they prove that this score function achieves capacity, which means with this choice of encoder [19] and decoder [17], they achieve asymptotic optimal code lengths for binary fingerprints of l ∼ 2c 2 ln nε −1 1 .…”
Section: Related Workmentioning
confidence: 98%
“…One of the main advances in recent years was finding [16], [18] the saddlepoint of the information-theoretic max-min game (see Section II-E) in the case of joint decoding. Knowing the location of the saddlepoint makes it easier for the tracer to build a decoder that works optimally against the worst-case attack and that works well against all other attacks too.…”
Section: A Collusion Attacks On Watermarkingmentioning
confidence: 99%
“…Asymptotically the symmetry is restored (due to → ∞); the attack strategy can then be parametrized more compactly as a set of probabilities θ ψ|m applied in each position independently. In the RDM the asymptotically optimal attack [17], [18] is the Interleaving attack: a colluder is selected uniformly at random and his symbol is output.…”
Section: Collusion Attackmentioning
confidence: 99%
See 1 more Smart Citation