On the capacity game of private fingerprinting systems under collusion attacks

被引:0
|
作者
Somekh-Baruch, A [1 ]
Merhav, N [1 ]
机构
[1] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of fingerprinting (FP) in the presence of collusive attacks is considered. It is modelled as a game between a fingerprinter and a decoder, on the one hand, and a coalition of two or more attackers whose action is modelled by a multiple access channel (MAC), on the other hand. A single-letter expression for the capacity is derived under mild conditions, asymptotically optimum strategies of the parties involved are characterized, and a lower bound on the error exponent is obtained.
引用
收藏
页码:191 / 191
页数:1
相关论文
共 50 条
  • [41] GAME MODELING OF COLLUSION AND INFLUENTIAL FACTORS UNDER UNIFORM TAXPAYER DISTRIBUTION
    Salimian, Salah
    Sobhanian, Mohammad Hadi
    JOURNAL OF DYNAMICS AND GAMES, 2024, 11 (01): : 63 - 75
  • [42] Capacity and random-coding error exponent for public fingerprinting game
    Wang, Ying
    Moulin, Pierre
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 1174 - +
  • [43] Discovering Hackers by Stealth: Predicting Fingerprinting Attacks on Honeypot Systems
    Naik, Nitin
    Jenkins, Paul
    2018 4TH IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (ISSE), 2018,
  • [44] Simulating Tardos Finger Printing Codes under Randomized Bits Collusion Attacks
    Tripathi, Alok
    Pandey, Rajiv
    Singh, Amarjeet
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 201 - 205
  • [45] A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
    Jaimez, Marc
    Esparza, Oscar
    Munoz, Jose L.
    Alins-Delgado, Juan J.
    Mata-Diaz, Jorge
    INFORMATION SECURITY THEORY AND PRACTICE: SMART DEVICES, PERVASIVE SYSTEMS, AND UBIQUITOUS NETWORKS, PROCEEDINGS, 2009, 5746 : 12 - 27
  • [46] Tacit Collusion in a One-Shot Game of Price Competition with Soft Capacity Constraints
    Cabon-Dhersin, Marie-Laure
    Drouhin, Nicolas
    JOURNAL OF ECONOMICS & MANAGEMENT STRATEGY, 2014, 23 (02) : 427 - 442
  • [47] Slowing Down to Speed Up: Mitigating Collusion Attacks in Content Distribution Systems
    Santos, Flavio
    Cordeiro, Weverton
    Barcellos, Marinho
    Gaspary, Luciano
    Hecht, Fabio V.
    Stiller, Burkhard
    2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 435 - 442
  • [48] A Bayesian game based defense scheme for CBTC systems under Man-in-the-middle attacks
    Li, Yang
    Zhu, Li
    2019 IEEE INTELLIGENT TRANSPORTATION SYSTEMS CONFERENCE (ITSC), 2019, : 2172 - 2176
  • [49] Stochastic game in remote estimation under DoS attacks
    Ding K.
    Dey S.
    Quevedo D.E.
    Shi L.
    IEEE Control Systems Letters, 2017, 1 (01): : 146 - 151
  • [50] On the capacity game of public watermarking systems
    Somekh-Baruch, A
    Merhav, N
    ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 223 - 223