• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2013 Fiscal Year Final Research Report

Construction and Performance Analysis of Digital Fingerprinting Code with Identifiability of All Malicious Users

Research Project

  • PDF
Project/Area Number 23500004
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Fundamental theory of informatics
Research InstitutionUniversity of Tsukuba

Principal Investigator

KOGA Hiroki  筑波大学, システム情報系, 准教授 (20272388)

Project Period (FY) 2011 – 2013
Keywords電子指紋符号 / コンテンツ保護 / 電子透かし / 不正者特定 / 符号化定理 / 結託耐性符号
Research Abstract

Digital fingerprinting codes are embedded in licensed digital contents for preventing illegal distribution by malicious users. Digital fingerprinting codes are usually required to have the ability to specify a part (or all) of a collusion of malicious users who generate the pirated copy.
In this study we consider an information-theoretic model of the digital fingerprinting code and characterize the maximum rate of the users (the capacity of the digital fingerprinting code) such that all the malicious users in a collusion can be specified with probality close to one under a certain assumption. We also discuss the zero-error capacity of the digital fingerprinting code for the case where all the malicious users in a collusion are specified without error under certain attack models.

  • Research Products

    (6 results)

All 2014 2013 2012 2011

All Journal Article (2 results) (of which Peer Reviewed: 2 results) Presentation (4 results)

  • [Journal Article] Characterization of the Smooth Renyi Entropy Using Majorization2013

    • Author(s)
      H. Koga
    • Journal Title

      Proc. 2013 IEEE Information Theory Workshop

      Pages: 604-608

    • Peer Reviewed
  • [Journal Article] On the Role of Mutual Information between the Shares in a Robust Secret Sharing Scheme2012

    • Author(s)
      H. Koga and K. Koyano
    • Journal Title

      Proc. 2012 International Symposium on Information Theory

      Pages: 260-265

    • Peer Reviewed
  • [Presentation] 定常性を仮定しない確率的な電子指紋符号の性能に関する一考察2014

    • Author(s)
      金井紘平, 古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      名古屋大学, 愛知県
    • Year and Date
      2014-03-11
  • [Presentation] 不正者の対称性のもとでの確率的な電子指紋符号に対する符号化定理2013

    • Author(s)
      古賀弘樹, 児矢野和也
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      あわら温泉まつや千千, 福井県
    • Year and Date
      2013-05-24
  • [Presentation] 確率的攻撃モデルにおけるBoneh-Shaw 符号の不正者追跡アルゴリズム2012

    • Author(s)
      金井紘平, 古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      豊田工業大学, 愛知県
    • Year and Date
      2012-07-19
  • [Presentation] 確率的電子指紋符号の性能に関する情報理論的考察2011

    • Author(s)
      児矢野和也, 古賀弘樹
    • Organizer
      第34回情報理論とその応用シンポジウム
    • Place of Presentation
      鶯宿温泉ホテル森の風, 岩手県
    • Year and Date
      2011-12-02

URL: 

Published: 2015-07-16  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi