• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Developments of the Capacity Formula and Identification Algorithms for a Catch-All Digital Fingerprinting Code

Research Project

Project/Area Number 26330003
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Theory of informatics
Research InstitutionUniversity of Tsukuba

Principal Investigator

KOGA Hiroki  筑波大学, システム情報系, 教授 (20272388)

Project Period (FY) 2014-04-01 – 2017-03-31
Project Status Completed (Fiscal Year 2016)
Budget Amount *help
¥4,030,000 (Direct Cost: ¥3,100,000、Indirect Cost: ¥930,000)
Fiscal Year 2016: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2015: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2014: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Keywords電子指紋符号 / 結託体制符号 / 容量公式 / 不正者特定 / 電子透かし / コンテンツ保護 / 結託耐性符号 / インタリーブ攻撃
Outline of Final Research Achievements

Digital fingerprinting codes are used for protecting digital contents from piracy. In this study we consider digital fingerprinting codes that can identify all the malicious users who generate an illegal copy from their contents and characterize the joint capacity from an information-theoretic viewpoint. We analyze the joint capacity of binary digital fingerprinting codes against the interleaving attack of c malicious uses in detail. We succeeded in obtaining higher orders of upper and lower bounds of the joint capacity as a function of c.
In addition, for the case of c=2 we propose an algorithm for identification of all the malicious users based on a score function. This algorithm leads to a lower bound of the joint capacity.

Report

(4 results)
  • 2016 Annual Research Report   Final Research Report ( PDF )
  • 2015 Research-status Report
  • 2014 Research-status Report
  • Research Products

    (8 results)

All 2016 2015 2014

All Journal Article (5 results) (of which Peer Reviewed: 5 results,  Acknowledgement Compliant: 1 results) Presentation (3 results)

  • [Journal Article] A Higher Order Analysis of the Joint Capacity of Digital FIngerprinting Codes against the Interleaving Attack2016

    • Author(s)
      Hiroki Koga and Kaoru Itabashi
    • Journal Title

      Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security

      Volume: - Pages: 23-28

    • DOI

      10.1145/2909827.2930788

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] New Fundamental Properties on a Secret-key Cryptosystem under Guessing Secrecy Criteria2016

    • Author(s)
      Shota Kamiya and Hiroki Koga
    • Journal Title

      Proceedings of 2016 Information Theory and its Applications

      Volume: -

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack2016

    • Author(s)
      Hiroki Koga and Kaoru Itabashi
    • Journal Title

      Proceedings of ACM Workshop on Information Hiding and Multimedia Security

      Volume: --

    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] On a Partition of a Finite Set and its Relationships to Encoding Tasks and the Renyi Entropy2015

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proceedings of 2015 IEEE International Symposium on Information Theory

      Volume: -- Pages: 1452-1456

    • DOI

      10.1109/isit.2015.7282696

    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] On the capacity and the zero-error capacity of k-resilient AND anti-collusion codes2014

    • Author(s)
      Hiroki Koga
    • Journal Title

      2014 IEEE Information Theory Workshop

      Volume: 1 Pages: 177-181

    • DOI

      10.1109/itw.2014.6970816

    • Related Report
      2014 Research-status Report
    • Peer Reviewed
  • [Presentation] インタリーブ攻撃に対する電子指紋符号の同時容量の評価2016

    • Author(s)
      古賀弘樹,板橋薫
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      電気通信大学(東京都調布市)
    • Year and Date
      2016-03-10
    • Related Report
      2015 Research-status Report
  • [Presentation] 連続分布に基づき符号語が生成される電子指紋符号の容量の下界について2015

    • Author(s)
      板橋薫,古賀弘樹
    • Organizer
      電子情報通信学会 情報理論研究会
    • Place of Presentation
      京都市国際交流会館(京都)
    • Year and Date
      2015-05-21 – 2015-05-22
    • Related Report
      2014 Research-status Report
  • [Presentation] 連続分布に基づき符号語が生成される電子指紋符号の容量の下界について2015

    • Author(s)
      古賀弘樹,板橋薫
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      京都国際交流会館(京都府京都市)
    • Year and Date
      2015-05-21
    • Related Report
      2015 Research-status Report

URL: 

Published: 2014-04-04   Modified: 2018-03-22  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi