Enhanced blind decoding of tardos codes with new MAP-based functions

This paper presents a new decoder for probabilistic binary traitor tracing codes under the marking assumption. It is based on a binary hypothesis testing rule which integrates a collusion channel relaxation so as to obtain numerical and simple accusation functions. This decoder is blind as no estimation of the collusion channel prior to the accusation is required. Experimentations show that using the proposed decoder gives better performance than the well-known symmetric version of the Tardos decoder for common attack channels.

[1]  Stefan Katzenbeisser,et al.  Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes , 2008, Des. Codes Cryptogr..

[2]  Hideki Imai,et al.  An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths , 2007, AAECC.

[3]  Gábor Tardos,et al.  High rate fingerprinting codes and the fingerprinting capacity , 2009, SODA.

[4]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[5]  Teddy Furon,et al.  Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm , 2011, Information Hiding.

[6]  Abhi Shelat,et al.  Lower bounds for collusion-secure fingerprinting , 2003, SODA '03.

[7]  Boris Skoric,et al.  Tardos Fingerprinting is Better Than We Thought , 2006, IEEE Transactions on Information Theory.

[8]  Pierre Moulin,et al.  Universal fingerprinting: Capacity and random-coding exponents , 2008, 2008 IEEE International Symposium on Information Theory.

[9]  Tamir Tassa,et al.  Improved versions of Tardos’ fingerprinting scheme , 2008, Des. Codes Cryptogr..

[10]  Patrick Robertson,et al.  A comparison of optimal and sub-optimal MAP decoding algorithms operating in the log domain , 1995, Proceedings IEEE International Conference on Communications ICC '95.

[11]  R. L. Fountain,et al.  The fingerprinted database , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.

[12]  Masakatu Morii,et al.  On the systematic generation of Tardos’s fingerprinting codes , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[13]  Teddy Furon,et al.  Worst case attacks against binary probabilistic traitor tracing codes , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[14]  Catherine A. Meadows,et al.  Fingerprinting Long Forgiving Messages , 1985, CRYPTO.

[15]  Teddy Furon,et al.  EM decoding of tardos traitor tracing codes , 2009, MM&Sec '09.