TY - GEN
T1 - Maximin optimality of the arcsine fingerprinting distribution and the interleaving attack for large coalitions
AU - Huang, Yen Wei
AU - Moulin, Pierre
PY - 2010/12/1
Y1 - 2010/12/1
N2 - Fingerprinting codes provide a means for the digital content distributor to trace the origin of an unauthorized redistribution. The maximum achievable rate, or capacity, has recently been derived as the value of a two-person zero-sum game between the fingerprinting embedder and the pirates. Under the so-called Boneh-Shaw marking assumption, we prove rigorously that the asymptotic capacity is 1/(k22 ln 2), where k is the number of pirates. Furthermore, we confirm our earlier conjecture that Tardos' choice of the arcsine distribution asymptotically maximizes the mutual information payoff function while the interleaving attack minimizes it. Along with the asymptotic behavior, numerical solutions to the game for small k are also presented.
AB - Fingerprinting codes provide a means for the digital content distributor to trace the origin of an unauthorized redistribution. The maximum achievable rate, or capacity, has recently been derived as the value of a two-person zero-sum game between the fingerprinting embedder and the pirates. Under the so-called Boneh-Shaw marking assumption, we prove rigorously that the asymptotic capacity is 1/(k22 ln 2), where k is the number of pirates. Furthermore, we confirm our earlier conjecture that Tardos' choice of the arcsine distribution asymptotically maximizes the mutual information payoff function while the interleaving attack minimizes it. Along with the asymptotic behavior, numerical solutions to the game for small k are also presented.
UR - http://www.scopus.com/inward/record.url?scp=79952493195&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79952493195&partnerID=8YFLogxK
U2 - 10.1109/WIFS.2010.5711451
DO - 10.1109/WIFS.2010.5711451
M3 - Conference contribution
AN - SCOPUS:79952493195
SN - 9781424490783
T3 - 2010 IEEE International Workshop on Information Forensics and Security, WIFS 2010
BT - 2010 IEEE International Workshop on Information Forensics and Security, WIFS 2010
T2 - 2010 IEEE International Workshop on Information Forensics and Security, WIFS 2010
Y2 - 12 December 2010 through 15 December 2010
ER -