Tardos codes for real

Teddy Furon 1 Mathieu Desoubeaux 2
1 TEXMEX - Multimedia content-based indexing
IRISA - Institut de Recherche en Informatique et Systèmes Aléatoires, Inria Rennes – Bretagne Atlantique
Abstract : This paper deals with active fingerprinting a.k.a. traitor tracing where a collusion of dishonest users merges their individual versions of a content to yield a pirated copy. The Tardos codes are one of the most powerful tools to fight against such collusion process by identifying the colluders. Instead of studying as usual the necessary and sufficient code length in a theoretical setup, we adopt the point of view of the practitioner. We call this the \textit{operational mode}, \ie a practical setup where a Tardos code has already been deployed and a pirated copy has been found. This new paradigm shows that the known bounds on the probability of accusing an innocent in the theoretical setup are way too pessimistic. Indeed the practitioner can resort to much tighter bounds because the problem is fundamentally much simpler under the operational mode. In the end, we benchmark under the operational mode several single decoders recently proposed in the literature. We believe this is a fair comparison reflecting what matters in reality.
Type de document :
Communication dans un congrès
IEEE Workshop on Information Forensics and Security, Dec 2014, Atlanta, United States. IEEE, pp.7, 2014
Liste complète des métadonnées

Littérature citée [12 références]  Voir  Masquer  Télécharger

Contributeur : Teddy Furon <>
Soumis le : vendredi 26 juin 2015 - 09:44:40
Dernière modification le : vendredi 16 novembre 2018 - 01:30:32
Document(s) archivé(s) le : vendredi 9 octobre 2015 - 17:29:53


Fichiers éditeurs autorisés sur une archive ouverte


  • HAL Id : hal-01066043, version 1


Teddy Furon, Mathieu Desoubeaux. Tardos codes for real. IEEE Workshop on Information Forensics and Security, Dec 2014, Atlanta, United States. IEEE, pp.7, 2014. 〈hal-01066043〉



Consultations de la notice


Téléchargements de fichiers