-
Two-Level Fingerprinting Codes
Authors:
N. Prasanth Anthapadmanabhan,
Alexander Barg
Abstract:
We introduce the notion of two-level fingerprinting and traceability codes. In this setting, the users are organized in a hierarchical manner by classifying them into various groups; for instance, by dividing the distribution area into several geographic regions, and collecting users from the same region into one group. Two-level fingerprinting and traceability codes have the following property:…
▽ More
We introduce the notion of two-level fingerprinting and traceability codes. In this setting, the users are organized in a hierarchical manner by classifying them into various groups; for instance, by dividing the distribution area into several geographic regions, and collecting users from the same region into one group. Two-level fingerprinting and traceability codes have the following property: As in traditional (one-level) codes, when given an illegal copy produced by a coalition of users, the decoder identifies one of the guilty users if the coalition size is less than a certain threshold $t$. Moreover, even when the coalition is of a larger size $s$ $(> t)$, the decoder still provides partial information by tracing one of the groups containing a guilty user.
We establish sufficient conditions for a code to possess the two-level traceability property. In addition, we also provide constructions for two-level fingerprinting codes and characterize the corresponding set of achievable rates.
△ Less
Submitted 4 May, 2009;
originally announced May 2009.
-
Intersecting random graphs and networks with multiple adjacency constraints: A simple example
Authors:
N. Prasanth Anthapadmanabhan,
Armand M. Makowski
Abstract:
When studying networks using random graph models, one is sometimes faced with situations where the notion of adjacency between nodes reflects multiple constraints. Traditional random graph models are insufficient to handle such situations.
A simple idea to account for multiple constraints consists in taking the intersection of random graphs. In this paper we initiate the study of random graphs…
▽ More
When studying networks using random graph models, one is sometimes faced with situations where the notion of adjacency between nodes reflects multiple constraints. Traditional random graph models are insufficient to handle such situations.
A simple idea to account for multiple constraints consists in taking the intersection of random graphs. In this paper we initiate the study of random graphs so obtained through a simple example. We examine the intersection of an Erdos-Renyi graph and of one-dimensional geometric random graphs. We investigate the zero-one laws for the property that there are no isolated nodes. When the geometric component is defined on the unit circle, a full zero-one law is established and we determine its critical scaling. When the geometric component lies in the unit interval, there is a gap in that the obtained zero and one laws are found to express deviations from different critical scalings. In particular, the first moment method requires a larger critical scaling than in the unit circle case in order to obtain the one law. This discrepancy is somewhat surprising given that the zero-one laws for the absence of isolated nodes are identical in the geometric random graphs on both the unit interval and unit circle.
△ Less
Submitted 4 September, 2008;
originally announced September 2008.
-
Randomized Frameproof Codes: Fingerprinting Plus Validation Minus Tracing
Authors:
N. Prasanth Anthapadmanabhan,
Alexander Barg
Abstract:
We propose randomized frameproof codes for content protection, which arise by studying a variation of the Boneh-Shaw fingerprinting problem. In the modified system, whenever a user tries to access his fingerprinted copy, the fingerprint is submitted to a validation algorithm to verify that it is indeed permissible before the content can be executed. We show an improvement in the achievable rates…
▽ More
We propose randomized frameproof codes for content protection, which arise by studying a variation of the Boneh-Shaw fingerprinting problem. In the modified system, whenever a user tries to access his fingerprinted copy, the fingerprint is submitted to a validation algorithm to verify that it is indeed permissible before the content can be executed. We show an improvement in the achievable rates compared to deterministic frameproof codes and traditional fingerprinting codes.
For coalitions of an arbitrary fixed size, we construct randomized frameproof codes which have an $O(n^2)$ complexity validation algorithm and probability of error $\exp(-Ω(n)),$ where $n$ denotes the length of the fingerprints. Finally, we present a connection between linear frameproof codes and minimal vectors for size-2 coalitions.
△ Less
Submitted 22 February, 2008;
originally announced February 2008.
-
On the Fingerprinting Capacity Under the Marking Assumption
Authors:
N. Prasanth Anthapadmanabhan,
Alexander Barg,
Ilya Dumer
Abstract:
We address the maximum attainable rate of fingerprinting codes under the marking assumption, studying lower and upper bounds on the value of the rate for various sizes of the attacker coalition. Lower bounds are obtained by considering typical coalitions, which represents a new idea in the area of fingerprinting and enables us to improve the previously known lower bounds for coalitions of size t…
▽ More
We address the maximum attainable rate of fingerprinting codes under the marking assumption, studying lower and upper bounds on the value of the rate for various sizes of the attacker coalition. Lower bounds are obtained by considering typical coalitions, which represents a new idea in the area of fingerprinting and enables us to improve the previously known lower bounds for coalitions of size two and three. For upper bounds, the fingerprinting problem is modelled as a communications problem. It is shown that the maximum code rate is bounded above by the capacity of a certain class of channels, which are similar to the multiple-access channel. Converse coding theorems proved in the paper provide new upper bounds on fingerprinting capacity.
It is proved that capacity for fingerprinting against coalitions of size two and three over the binary alphabet satisfies $0.25 \leq C_{2,2} \leq 0.322$ and $0.083 \leq C_{3,2} \leq 0.199$ respectively. For coalitions of an arbitrary fixed size $t,$ we derive an upper bound $(t\ln2)^{-1}$ on fingerprinting capacity in the binary case. Finally, for general alphabets, we establish upper bounds on the fingerprinting capacity involving only single-letter mutual information quantities.
△ Less
Submitted 20 February, 2008; v1 submitted 14 December, 2006;
originally announced December 2006.