• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Construction and Performance Analysis of Digital Fingerprinting Code with Identifiability of All Malicious Users

Research Project

Project/Area Number 23500004
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Fundamental theory of informatics
Research InstitutionUniversity of Tsukuba

Principal Investigator

KOGA Hiroki  筑波大学, システム情報系, 准教授 (20272388)

Project Period (FY) 2011 – 2013
Project Status Completed (Fiscal Year 2013)
Budget Amount *help
¥4,030,000 (Direct Cost: ¥3,100,000、Indirect Cost: ¥930,000)
Fiscal Year 2013: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2012: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2011: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Keywords電子指紋符号 / コンテンツ保護 / 電子透かし / 不正者特定 / 符号化定理 / 結託耐性符号 / 著作権保護 / 容量 / 情報理論 / 秘密分散法 / 情報セキュリティ
Research Abstract

Digital fingerprinting codes are embedded in licensed digital contents for preventing illegal distribution by malicious users. Digital fingerprinting codes are usually required to have the ability to specify a part (or all) of a collusion of malicious users who generate the pirated copy.
In this study we consider an information-theoretic model of the digital fingerprinting code and characterize the maximum rate of the users (the capacity of the digital fingerprinting code) such that all the malicious users in a collusion can be specified with probality close to one under a certain assumption. We also discuss the zero-error capacity of the digital fingerprinting code for the case where all the malicious users in a collusion are specified without error under certain attack models.

Report

(4 results)
  • 2013 Annual Research Report   Final Research Report ( PDF )
  • 2012 Research-status Report
  • 2011 Research-status Report
  • Research Products

    (16 results)

All 2014 2013 2012 2011

All Journal Article (5 results) (of which Peer Reviewed: 5 results) Presentation (11 results)

  • [Journal Article] Characterization of the Smooth Renyi Entropy Using Majorization2013

    • Author(s)
      H. Koga
    • Journal Title

      Proc. 2013 IEEE Information Theory Workshop

      Pages: 604-608

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Characterization of the Smooth Renyi Entropy Using Majorization2013

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proceedings of 2013 IEEE Information Theory Workshop

      Volume: なし Pages: 1-5

    • DOI

      10.1109/itw.2013.6691332

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] On the Role of Mutual Information between the Shares in a Robust Secret Sharing Scheme2012

    • Author(s)
      H. Koga and K. Koyano
    • Journal Title

      Proc. 2012 International Symposium on Information Theory

      Pages: 260-265

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] On the Role of Mutual Information between the Shares in a Robust Secret Sharing Scheme2012

    • Author(s)
      H. Koga and K. Koyano
    • Journal Title

      Proc. 2012 International Symposium on Information Theory and its Applications

      Volume: DVD

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Four Limits in Probability and Their Roles in Source Coding2011

    • Author(s)
      Hiroki Koga
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E94-A Issue: 11 Pages: 2073-2082

    • DOI

      10.1587/transfun.E94.A.2073

    • NAID

      10030191410

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Presentation] 定常性を仮定しない確率的な電子指紋符号の性能に関する一考察2014

    • Author(s)
      金井紘平, 古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      名古屋大学, 愛知県
    • Year and Date
      2014-03-11
    • Related Report
      2013 Final Research Report
  • [Presentation] 定常性を仮定しない確率的な電子指紋符号の性能に関する一考察2014

    • Author(s)
      金井紘平,古賀弘樹
    • Organizer
      電子情報通信学会
    • Place of Presentation
      名古屋大学
    • Related Report
      2013 Annual Research Report
  • [Presentation] 不正者の対称性のもとでの確率的な電子指紋符号に対する符号化定理2013

    • Author(s)
      古賀弘樹, 児矢野和也
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      あわら温泉まつや千千, 福井県
    • Year and Date
      2013-05-24
    • Related Report
      2013 Final Research Report
  • [Presentation] 不正者の対称性のもとでの確率的な電子指紋符号に対する符号化定理2013

    • Author(s)
      古賀弘樹,児矢野和也
    • Organizer
      電子情報通信学会
    • Place of Presentation
      芦原温泉 まつや千千
    • Related Report
      2013 Annual Research Report
  • [Presentation] (k,n)しきい値法における多数決を用いた不正検出方式とその性能評価2013

    • Author(s)
      島崎憲明,古賀弘樹
    • Organizer
      電子情報通信学会 情報理論研究会
    • Place of Presentation
      関西学院大学
    • Related Report
      2012 Research-status Report
  • [Presentation] 不正者の対称性のもとでの電子指紋符号に対する符号化定理2013

    • Author(s)
      古賀弘樹,児矢野和也
    • Organizer
      電子情報通信学会 情報理論研究会
    • Place of Presentation
      まつや千千
    • Related Report
      2012 Research-status Report
  • [Presentation] 確率的攻撃モデルにおけるBoneh-Shaw 符号の不正者追跡アルゴリズム2012

    • Author(s)
      金井紘平, 古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      豊田工業大学, 愛知県
    • Year and Date
      2012-07-19
    • Related Report
      2013 Final Research Report
  • [Presentation] 確率的攻撃モデルにおけるBoneh-Shaw符号の不正者追跡アルゴリズム2012

    • Author(s)
      金井紘平,古賀弘樹
    • Organizer
      電子情報通信学会 情報理論研究会
    • Place of Presentation
      豊田工業大学
    • Related Report
      2012 Research-status Report
  • [Presentation] なりすまし攻撃を検出できる(k,n)しきい値法の構成とその最適性2012

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報学会2012年総合大会
    • Place of Presentation
      岡山大学(岡山県)
    • Related Report
      2011 Research-status Report
  • [Presentation] 確率的電子指紋符号の性能に関する情報理論的考察2011

    • Author(s)
      児矢野和也, 古賀弘樹
    • Organizer
      第34回情報理論とその応用シンポジウム
    • Place of Presentation
      鶯宿温泉ホテル森の風, 岩手県
    • Year and Date
      2011-12-02
    • Related Report
      2013 Final Research Report
  • [Presentation] 確率的電子指紋符号の性能に関する情報理論的考察2011

    • Author(s)
      児矢野和也,古賀弘樹
    • Organizer
      情報理論とその応用シンポジウム
    • Place of Presentation
      ホテル森の風(岩手県)
    • Related Report
      2011 Research-status Report

URL: 

Published: 2011-08-05   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi