Including a unique code in each copy of a distributed document is an effective way of fighting intellectual piracy. Codes designed for this purpose that are secure against collusion attacks are called fingerprinting codes.
In this paper we consider fingerprinting with the marking assumption and design codes that achieve much higher rates than previous constructions. We conjecture that these codes attain the maximum possible rate (the fingerprinting capacity) for any fixed number of pirates. We prove new upper bounds for the fingerprinting capacity that are not far from the rate of our codes. On the downside the accusation algorithm of our codes are much slower than those of earlier codes.
We introduce the novel model of weak fingerprinting codes where one pirate should be caught only if the identity of all other pirates are revealed. We construct fingerprinting codes in this model with improved rates but our upper bound on the rate still applies. In fact, these improved codes achieve the fingerprinting capacity of the weak model by a recent upper bound.
Using analytic techniques we compare the rates of our codes in the standard model and the rates of the optimal codes in the weak model. To our surprise these rates asymptotically agree, that is, their ratio tends to 1 as t goes to infinity. Although we cannot prove that each one of our codes in the standard model achieves the fingerprinting capacity, this proves that asymptotically they do.
[1]
Alexander Barg,et al.
On the Fingerprinting Capacity Under the Marking Assumption
,
2006,
IEEE Transactions on Information Theory.
[2]
Boris Skoric,et al.
Tardos Fingerprinting is Better Than We Thought
,
2006,
IEEE Transactions on Information Theory.
[3]
Dan.
Collusion-Secure Fingerprinting for Digital Data
,
2002
.
[4]
Tamir Tassa,et al.
Improved versions of Tardos’ fingerprinting scheme
,
2008,
Des. Codes Cryptogr..
[5]
Hideki Imai,et al.
Optimization of Memory Usage in Tardos's Fingerprinting Codes
,
2006,
cs/0610036.
[6]
Dan Boneh,et al.
Collusion-Secure Fingerprinting for Digital Data
,
1998,
IEEE Trans. Inf. Theory.
[7]
Imre Csiszár,et al.
Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition
,
2011
.
[8]
Stefan Katzenbeisser,et al.
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
,
2008,
Des. Codes Cryptogr..