On the capacity game of private fingerprinting systems under collusion attacks

被引:0
|
作者
Somekh-Baruch, A [1 ]
Merhav, N [1 ]
机构
[1] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of fingerprinting (FP) in the presence of collusive attacks is considered. It is modelled as a game between a fingerprinter and a decoder, on the one hand, and a coalition of two or more attackers whose action is modelled by a multiple access channel (MAC), on the other hand. A single-letter expression for the capacity is derived under mild conditions, asymptotically optimum strategies of the parties involved are characterized, and a lower bound on the error exponent is obtained.
引用
收藏
页码:191 / 191
页数:1
相关论文
共 50 条
  • [31] Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
    Chen, Yan
    Lin, W. Sabrina
    Liu, K. J. Ray
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2010, 19 (07) : 1798 - 1807
  • [32] A Stackelberg Game Approach to the Stability of Networked Switched Systems Under DoS Attacks
    Lian, Jie
    Jia, Peilin
    Wu, Feiyue
    Huang, Xi
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (04): : 2086 - 2097
  • [33] Switching defence for switched systems under malicious attacks: A Stackelberg game approach
    Huang, Yabing
    Zhao, Jun
    NONLINEAR ANALYSIS-HYBRID SYSTEMS, 2021, 42
  • [34] Simple Countermeasure to Non-Linear Collusion Attacks Targeted for Spread-Spectrum Fingerprinting Scheme
    Kuribayashi, Minoru
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (01): : 50 - 59
  • [35] Performance of detection statistics under collusion attacks on independent multimedia fingerprints
    Zhao, H
    Wu, M
    Wang, ZJ
    Liu, KJR
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I, PROCEEDINGS, 2003, : 205 - 208
  • [36] Static Detection of Collusion Attacks in ARBAC-based Workflow Systems
    Calzavara, Stefano
    Rabitti, Alvise
    Steffinlongo, Enrico
    Bugliesi, Michele
    2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, : 458 - 470
  • [37] Performance of random fingerprinting codes under arbitrary nonlinear attacks
    Moulin, Pierre
    Kiyavash, Negar
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 157 - +
  • [38] A stochastic game approach to the security issue of networked control systems under jamming attacks
    Liu, Shichao
    Liu, Peter X.
    El Saddik, Abdulmotaleb
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2014, 351 (09): : 4570 - 4583
  • [39] Collusion with capacity constraints under a sales maximization rationing rule
    Notsu, Takaomi
    INTERNATIONAL JOURNAL OF GAME THEORY, 2023, 52 (02) : 485 - 516
  • [40] Collusion with capacity constraints under a sales maximization rationing rule
    Takaomi Notsu
    International Journal of Game Theory, 2023, 52 : 485 - 516