Tardos has proposed a randomized fingerprinting code that is provably secure against collusion attacks. We revisit his scheme and show that it has significantly better performance than suggested in the original paper. First, we introduce variables in place of Tardos' hard-coded constants and we allow for an independent choice of the desired false positive (FP) and false negative (FN) error rates. Following through Tardos' proofs with these modifications, we show that the code length can be reduced by more than a factor of two in typical content distribution applications where high FN rates can be tolerated. Second, we study the statistical properties of the code. Under some reasonable assumptions, the accusation sums can be regarded as Gaus...
The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property...
The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property...
Fingerprinting provides a means of tracing unauthorized redistribution of digital data by individual...
Tardos has proposed a randomized fingerprinting code that is provably secure against collusion attac...
Tardos has proposed a randomized fingerprinting code that is provably secure against collusion attac...
Tardos has proposed a randomized fingerprinting code that is provably secure against collusion attac...
Tardos has proposed a randomized fingerprinting code that is provably secure against collusion attac...
Tardos has proposed a randomized fingerprinting code that is provably secure against collusion attac...
We study the Tardos ’ probabilistic fingerprinting scheme and show that its codeword length may be s...
We study the probability distribution of user accusations in the q-ary Tardos fingerprinting system ...
We study the probability distribution of user accusations in the q-ary Tardos fingerprinting system ...
The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property...
We study the probability distribution of user accusations in the q-ary Tardos fingerprinting system ...
International audienceThis article presents a study of the embedding of Tardos binary fingerprinting...
We study the probability distribution of user accusations in the q-ary Tardos fingerprinting system ...
The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property...
The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property...
Fingerprinting provides a means of tracing unauthorized redistribution of digital data by individual...
Tardos has proposed a randomized fingerprinting code that is provably secure against collusion attac...
Tardos has proposed a randomized fingerprinting code that is provably secure against collusion attac...
Tardos has proposed a randomized fingerprinting code that is provably secure against collusion attac...
Tardos has proposed a randomized fingerprinting code that is provably secure against collusion attac...
Tardos has proposed a randomized fingerprinting code that is provably secure against collusion attac...
We study the Tardos ’ probabilistic fingerprinting scheme and show that its codeword length may be s...
We study the probability distribution of user accusations in the q-ary Tardos fingerprinting system ...
We study the probability distribution of user accusations in the q-ary Tardos fingerprinting system ...
The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property...
We study the probability distribution of user accusations in the q-ary Tardos fingerprinting system ...
International audienceThis article presents a study of the embedding of Tardos binary fingerprinting...
We study the probability distribution of user accusations in the q-ary Tardos fingerprinting system ...
The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property...
The Tardos code is a much studied collusion-resistant fingerprinting code, with the special property...
Fingerprinting provides a means of tracing unauthorized redistribution of digital data by individual...