Optimization of Memory Usage in Tardos's Fingerprinting Codes
نویسندگان
چکیده
It is known that Tardos’s collusion-secure probabilistic fingerprinting code (Tardos code; STOC’03) has length of theoretically minimal order with respect to the number of colluding users. However, Tardos code uses certain continuous probability distribution in codeword generation, which creates some problems for practical use, in particular, it requires large extra memory. A solution proposed so far is to use some finite probability distributions instead. In this paper, we determine the optimal finite distribution in order to decrease extra memory amount. By our result, the extra memory is reduced to 1/32 of the original, or even becomes needless, in some practical setting. Moreover, the code length is also reduced, e.g. to about 20.6% of Tardos code asymptotically. Finally, we address some other practical issues such as approximation errors which are inevitable in any real implementation.
منابع مشابه
COMPUTER CODES FOR COLLIDING BODIES OPTIMIZATION AND ITS ENHANCED VERSION
Colliding bodies optimization (CBO) is a new population-based stochastic optimization algorithm based on the governing laws of one dimensional collision between two bodies from the physics. Each agent is modeled as a body with a specified mass and velocity. A collision occurs between pairs of objects to find the global or near-global solutions. Enhanced colliding bodies optimization (ECBO) uses...
متن کاملTelepathic Communication Generation using Nano Fiber Ring
The communication security is set up by registration during the first beliefand get in touch between two human beings. The safety codes among them aregenerated and the records are blocked by these protection codes if the end user is not therequired one. On the other hand, the unlocked records are transmitted if the required enduser is confirmed by the feedback brain signals via the comments min...
متن کاملOptimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature
We investigate candidates of finite random variables for c-secure random fingerprinting codes, in viewpoints of both code lengths and required memories. We determine, under a natural assumption, the random variables with the minimal number of outputs (i.e. optimal in a viewpoint of memory) among all candidates, by revealing their deep relation with theory of Gauss-Legendre quadrature (a famous ...
متن کاملReducing Computational and Memory Cost of Substructuring Technique in Finite Element Models
Substructuring in the finite element method is a technique that reduces computational cost and memory usage for analysis of complex structures. The efficiency of this technique depends on the number of substructures in different problems. Some subdivisions increase computational cost, but require little memory usage and vice versa. In the present study, the cost functions of computations and me...
متن کاملFingerprinting Codes for Multimedia Data against Averaging Attack
Code construction for digital fingerprinting, which is a copyright protection technique for multimedia, is considered. Digital fingerprinting should deter collusion attacks, where several fingerprinted copies of the same content are mixed to disturb their fingerprints. In this paper, we consider the averaging attack, which is known to be effective for multimedia fingerprinting with the spread s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006