On the capacity and the zero-error capacity of k-resilient AND anti-collusion codes

Embedding anti-collusion fingerprinting codes to digital contents enables us to protect the digital contents from piracy. Recently, Trappe et al. proposed an anti-collusion code (AND-ACC) such that all the illegal users are exactly detected from a binary sequence obtained from AND of all the codewords of the illegal users, where the number of the illegal users is assumed to be less than or equal to a constant k ≥ 2. In this paper we focus on the AND-ACC and analyze the number of codewords M with increasing the codeword length n for an arbitrarily fixed k ≥ 2. First, we define the zero-error capacity C*k of the AND-ACC and give a lower and an upper bounds of C*k. The lower bound of C*k is obtained by using a lemma used in a coding theorem on the identification codes. In addition, we extend the AND-ACC to the case where negligible detection error is permitted. We define the capacity Ck and give a lower and an upper bounds of Ck. These bounds are established by using techniques used for coding of a multiple-access channel.

[1]  Pierre Moulin,et al.  Universal fingerprinting: Capacity and random-coding exponents , 2008, 2008 IEEE International Symposium on Information Theory.

[2]  Rudolf Ahlswede,et al.  Identification via channels , 1989, IEEE Trans. Inf. Theory.

[3]  Jacob Wolfowitz,et al.  Multiple Access Channels , 1978 .

[4]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[5]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[6]  Rudolf Ahlswede,et al.  Multi-way communication channels , 1973 .

[7]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[8]  Douglas R. Stinson,et al.  Combinatorial designs: constructions and analysis , 2003, SIGA.

[9]  Alexander Barg,et al.  Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.

[10]  Hiroki Koga,et al.  A Digital Fingerprinting Code Based on a Projective Plane and Its Identifiability of All Malicious Users , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[11]  Alexander Barg,et al.  On the Fingerprinting Capacity Under the Marking Assumption , 2006, IEEE Transactions on Information Theory.

[12]  G. R. Blakley,et al.  Random coding technique for digital fingerprinting codes: fighting two pirates revisited , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..