2 colluders ont des symboles différents sur 13% des blocs, 4 colluders 45%. Autrement dit, e n'est plus petit devant m ,
Traitor tracing for prerecorded and recordable media, Proceedings of the 4th ACM workshop on Digital rights management , DRM '04, pp.83-90, 2004. ,
DOI : 10.1145/1029146.1029160
Tracing traitors, Proc. of Advances in cryptology, CRYPTO'94, pp.257-270, 1994. ,
DOI : 10.1007/3-540-48658-5_25
Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998. ,
DOI : 10.1109/18.705568
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.6638
Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes, SIAM Journal on Discrete Mathematics, vol.11, issue.1, pp.41-53, 1998. ,
DOI : 10.1137/S0895480196304246
Tracing traitors, IEEE Transactions on Information Theory, vol.46, issue.3, pp.893-910, 2000. ,
DOI : 10.1109/18.841169
The Boneh???Shaw Fingerprinting Scheme is Better Than We Thought, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, pp.248-255, 2006. ,
DOI : 10.1109/TIFS.2006.873596
Lower bounds for collusion-secure fingerprinting codes, Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp.472-479, 2003. ,
Optimal probabilistic fingerprint codes, Proc. of the 35th annual ACM symposium on theory of computing, pp.116-125, 2003. ,
DOI : 10.1145/1346330.1346335
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911
Tardos Fingerprinting is Better Than We Thought, IEEE Transactions on Information Theory, vol.54, issue.8, 2008. ,
DOI : 10.1109/TIT.2008.926307
URL : http://arxiv.org/abs/cs/0607131
On the design and optimisation of tardos probabilistic fingerprinting codes, Proc. of the 10th Information Hiding Workshop, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00504549
Experimental assessment of the reliability for watermarking and fingerprinting schemes, EURASIP Jounal on Information Security ID, vol.12, p.414962, 2008. ,
On-off keying modulation and tardos fingerprinting, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, 2008. ,
DOI : 10.1145/1411328.1411347
URL : https://hal.archives-ouvertes.fr/inria-00504606