Skip to main content

Showing 1–4 of 4 results for author: Anthapadmanabhan, N P

.
  1. arXiv:0905.0417  [pdf, ps, other

    cs.IT cs.CR

    Two-Level Fingerprinting Codes

    Authors: N. Prasanth Anthapadmanabhan, Alexander Barg

    Abstract: We introduce the notion of two-level fingerprinting and traceability codes. In this setting, the users are organized in a hierarchical manner by classifying them into various groups; for instance, by dividing the distribution area into several geographic regions, and collecting users from the same region into one group. Two-level fingerprinting and traceability codes have the following property:… ▽ More

    Submitted 4 May, 2009; originally announced May 2009.

    Comments: 5 pages, 1 figure, Proc. 2009 IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, June 28 - July 3, 2009

  2. arXiv:0809.0918  [pdf, ps, other

    cs.IT math.PR

    Intersecting random graphs and networks with multiple adjacency constraints: A simple example

    Authors: N. Prasanth Anthapadmanabhan, Armand M. Makowski

    Abstract: When studying networks using random graph models, one is sometimes faced with situations where the notion of adjacency between nodes reflects multiple constraints. Traditional random graph models are insufficient to handle such situations. A simple idea to account for multiple constraints consists in taking the intersection of random graphs. In this paper we initiate the study of random graphs… ▽ More

    Submitted 4 September, 2008; originally announced September 2008.

    Comments: Submitted to IEEE JSAC issue on Stochastic Geometry and Random Graphs for Wireless Networks

  3. arXiv:0802.3419  [pdf, ps, other

    cs.IT cs.CR

    Randomized Frameproof Codes: Fingerprinting Plus Validation Minus Tracing

    Authors: N. Prasanth Anthapadmanabhan, Alexander Barg

    Abstract: We propose randomized frameproof codes for content protection, which arise by studying a variation of the Boneh-Shaw fingerprinting problem. In the modified system, whenever a user tries to access his fingerprinted copy, the fingerprint is submitted to a validation algorithm to verify that it is indeed permissible before the content can be executed. We show an improvement in the achievable rates… ▽ More

    Submitted 22 February, 2008; originally announced February 2008.

    Comments: 5 pages, To appear in the Proceedings of Conference on Information Sciences and Systems (CISS), Princeton, NJ, Mar 2008

  4. arXiv:cs/0612073  [pdf, ps, other

    cs.IT cs.CR

    On the Fingerprinting Capacity Under the Marking Assumption

    Authors: N. Prasanth Anthapadmanabhan, Alexander Barg, Ilya Dumer

    Abstract: We address the maximum attainable rate of fingerprinting codes under the marking assumption, studying lower and upper bounds on the value of the rate for various sizes of the attacker coalition. Lower bounds are obtained by considering typical coalitions, which represents a new idea in the area of fingerprinting and enables us to improve the previously known lower bounds for coalitions of size t… ▽ More

    Submitted 20 February, 2008; v1 submitted 14 December, 2006; originally announced December 2006.

    Comments: final version, 12 pages, 2 figures, to appear in IEEE Trans. on Inform. Theory - Special Issue on Information-theoretic Security, Jun 2008, simplified proofs in Sections II and III, changes in Theorem 4.1