Collusion-secure codes are used for digital fingerprinting and for traitor tracing. In both cases, the goal is to prevent unauthorized copying of copyrighted material, by tracing at least one guilty user when illegal copies appear. The most well-known collusion-secure code is due to Boneh and Shaw (1995/98). In this paper we improve the decoding algorithm by using soft output from the inner decoder, and we show that this permits using significantly shorter codewords.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Hans Georg SCHAATHUN, Marcel FERNANDEZ, "Soft Decision Decoding of Boneh-Shaw Fingerprinting Codes" in IEICE TRANSACTIONS on Fundamentals,
vol. E89-A, no. 10, pp. 2603-2608, October 2006, doi: 10.1093/ietfec/e89-a.10.2603.
Abstract: Collusion-secure codes are used for digital fingerprinting and for traitor tracing. In both cases, the goal is to prevent unauthorized copying of copyrighted material, by tracing at least one guilty user when illegal copies appear. The most well-known collusion-secure code is due to Boneh and Shaw (1995/98). In this paper we improve the decoding algorithm by using soft output from the inner decoder, and we show that this permits using significantly shorter codewords.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e89-a.10.2603/_p
Copy
@ARTICLE{e89-a_10_2603,
author={Hans Georg SCHAATHUN, Marcel FERNANDEZ, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Soft Decision Decoding of Boneh-Shaw Fingerprinting Codes},
year={2006},
volume={E89-A},
number={10},
pages={2603-2608},
abstract={Collusion-secure codes are used for digital fingerprinting and for traitor tracing. In both cases, the goal is to prevent unauthorized copying of copyrighted material, by tracing at least one guilty user when illegal copies appear. The most well-known collusion-secure code is due to Boneh and Shaw (1995/98). In this paper we improve the decoding algorithm by using soft output from the inner decoder, and we show that this permits using significantly shorter codewords.},
keywords={},
doi={10.1093/ietfec/e89-a.10.2603},
ISSN={1745-1337},
month={October},}
Copy
TY - JOUR
TI - Soft Decision Decoding of Boneh-Shaw Fingerprinting Codes
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 2603
EP - 2608
AU - Hans Georg SCHAATHUN
AU - Marcel FERNANDEZ
PY - 2006
DO - 10.1093/ietfec/e89-a.10.2603
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E89-A
IS - 10
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - October 2006
AB - Collusion-secure codes are used for digital fingerprinting and for traitor tracing. In both cases, the goal is to prevent unauthorized copying of copyrighted material, by tracing at least one guilty user when illegal copies appear. The most well-known collusion-secure code is due to Boneh and Shaw (1995/98). In this paper we improve the decoding algorithm by using soft output from the inner decoder, and we show that this permits using significantly shorter codewords.
ER -