2009 IEEE International Symposium on Information Theory 2009
DOI: 10.1109/isit.2009.5205882
|View full text |Cite
|
Sign up to set email alerts
|

Saddle-point solution of the fingerprinting capacity game under the marking assumption

Abstract: We study a fingerprinting game in which the collusion channel is unknown. The encoder embeds fingerprints into a host sequence and provides the decoder with the capability to trace back pirated copies to the colluders.Fingerprinting capacity has recently been derived as the limit value of a sequence of maxmin games with mutual information as the payoff function. However, these games generally do not admit saddle-point solutions and are very hard to solve numerically. Here under the so-called Boneh-Shaw marking… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
39
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(41 citation statements)
references
References 17 publications
(24 reference statements)
2
39
0
Order By: Relevance
“…Amiri and Tardos [1] have given a capacity-achieving joint decoder construction for the binary code. (Capacity refers to the information-theoretic treatment [15,10,7,3] of the colluder attack as a communication channel.) However, the construction is rather impractical, requiring computations for many candidate coalitions.…”
mentioning
confidence: 99%
“…Amiri and Tardos [1] have given a capacity-achieving joint decoder construction for the binary code. (Capacity refers to the information-theoretic treatment [15,10,7,3] of the colluder attack as a communication channel.) However, the construction is rather impractical, requiring computations for many candidate coalitions.…”
mentioning
confidence: 99%
“…For q = 2 it was conjectured that the capacity is asymptotically 1/(c 2 2 ln 2). The conjecture was proved in [1,6]. Amiri and Tardos [1] developed a joint decoder scheme (for the binary case) where candidate coalitions get a score related to the mutual information between their symbols and y.…”
Section: Asymptotic Channel Capacitymentioning
confidence: 98%
“…The analysis of achievable performance was greatly helped by the onset of an information-theoretic treatment of anti-collusion codes. The whole class of bias-based codes can be treated as a maximin game between the watermarker and the colluders [2,6,12], independently played for each segment, where the payoff function is the mutual information between the symbols x 1 , . .…”
Section: Asymptotic Channel Capacitymentioning
confidence: 99%
“…Amiri and Tardos [2] have given a capacity-achieving joint decoder construction for the binary code. (Capacity refers to the informationtheoretic treatment [11,16,22] of the colluder attack as a communication channel.) However, the construction is rather impractical, requiring computations for many candidate coalitions.…”
Section: Tardos Codesmentioning
confidence: 99%
“…This guarantees convergence to the normal distribution. -The 'interleaving' colluder strategy, which is known to be information-theoretically optimal [10,12] for c 0 → ∞ and binary alphabet, turns out to have special properties: the pdf andμ do not depend on the coalition size; the left and right tail are maximally heavy. -We compute the Fourier transformφ (characteristic function) of ϕ.…”
Section: Contributions and Outlinementioning
confidence: 99%