TY - GEN
T1 - Expurgated Gaussian fingerprinting codes
AU - Moulin, Pierre
AU - Kiyavash, Negar
N1 - Copyright:
Copyright 2013 Elsevier B.V., All rights reserved.
PY - 2007
Y1 - 2007
N2 - This paper analyzes the performance of collusion attacks on random fingerprinting codes, when the colluders are subject to an almost-sure squared distortion constraint and a list decoder is used. We derive an exact characterization of the type-I and type-II error exponents of the fingerprinting system. A Gaussian ensemble and an expurgated Gaussian ensemble of codes are considered, and the corresponding random-coding exponents are derived. Explicit optimal strategies for the colluders are derived as well.
AB - This paper analyzes the performance of collusion attacks on random fingerprinting codes, when the colluders are subject to an almost-sure squared distortion constraint and a list decoder is used. We derive an exact characterization of the type-I and type-II error exponents of the fingerprinting system. A Gaussian ensemble and an expurgated Gaussian ensemble of codes are considered, and the corresponding random-coding exponents are derived. Explicit optimal strategies for the colluders are derived as well.
KW - Digital fingerprinting
KW - Large deviations
KW - Random codes
UR - http://www.scopus.com/inward/record.url?scp=51649122753&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=51649122753&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2007.4557308
DO - 10.1109/ISIT.2007.4557308
M3 - Conference contribution
AN - SCOPUS:51649122753
SN - 1424414296
SN - 9781424414291
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 711
EP - 715
BT - Proceedings - 2007 IEEE International Symposium on Information Theory, ISIT 2007
T2 - 2007 IEEE International Symposium on Information Theory, ISIT 2007
Y2 - 24 June 2007 through 29 June 2007
ER -