{"title":"Two-level fingerprinting: Stronger definitions and code constructions","authors":"N. Anthapadmanabhan, A. Barg","doi":"10.1109/ISIT.2010.5513761","DOIUrl":null,"url":null,"abstract":"We develop the concept of hierarchical fingerprinting introduced in our recent work (ISIT2009). The object of two-level fingerprinting is content protection against coalitions of t pirates in such a manner that one of the pirates can be identified exactly if t ≤ t2 or localized to within a small group if t2 < t ≤ t1, where t1 and t2 are parameters of the system. In this work, we require the additional property that in the latter case no innocent users are accused of belonging to the pirate coalition. We construct two-level fingerprinting codes with polynomial complexity of identification that satisfy the strong definition of hierarchical fingerprinting described above.","PeriodicalId":147055,"journal":{"name":"2010 IEEE International Symposium on Information Theory","volume":"325 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Symposium on Information Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2010.5513761","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
We develop the concept of hierarchical fingerprinting introduced in our recent work (ISIT2009). The object of two-level fingerprinting is content protection against coalitions of t pirates in such a manner that one of the pirates can be identified exactly if t ≤ t2 or localized to within a small group if t2 < t ≤ t1, where t1 and t2 are parameters of the system. In this work, we require the additional property that in the latter case no innocent users are accused of belonging to the pirate coalition. We construct two-level fingerprinting codes with polynomial complexity of identification that satisfy the strong definition of hierarchical fingerprinting described above.