[go: up one dir, main page]

Pérez-Freire et al., 2009 - Google Patents

Blind decoder for binary probabilistic traitor tracing codes

Pérez-Freire et al., 2009

View PDF
Document ID
2265828253587859139
Author
Pérez-Freire L
Furon T
Publication year
Publication venue
2009 First IEEE International Workshop on Information Forensics and Security (WIFS)

External Links

Snippet

This paper presents a new decoder for probabilistic binary traitor tracing codes which is based on classical hypothesis testing and estimation theory. This new decoder is blind, in the sense of ignoring a priori the collusion attack it is facing. It basically performs a joint …
Continue reading at inria.hal.science (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Amiri et al. High rate fingerprinting codes and the fingerprinting capacity
Moulin Universal fingerprinting: Capacity and random-coding exponents
Bhattacharyya et al. A second order cone programming formulation for classifying missing data
Zhan et al. Anomaly detection in dynamic systems using weak estimators
CN112907431B (en) Steganalysis method for robust countersteganalysis
CN118118254A (en) APT attack detection method and system based on traceability graph behavior sequence prediction
Pérez-Freire et al. Blind decoder for binary probabilistic traitor tracing codes
Alnajjab et al. Attacks on sensor network parameter estimation with quantization: Performance and asymptotically optimum processing
Zargarbashi et al. Robust yet efficient conformal prediction sets
Furon et al. Estimating the minimal length of Tardos code
Meerwald et al. Towards joint Tardos decoding: the ‘Don Quixote’algorithm
Oosterwijk et al. Optimal suspicion functions for Tardos traitor tracing schemes
CN118869322A (en) A fine-grained attack behavior detection method for large-scale networks
Furon et al. EM decoding of Tardos traitor tracing codes
Nolte et al. The cool and the cruel: separating hard parts of LWE secrets
Zhu et al. Deep learning for waveform level receiver design with natural redundancy
Park et al. SignSGD with federated defense: Harnessing adversarial attacks through gradient sign decoding
Furon et al. Decoding fingerprints using the Markov chain Monte Carlo method
Li et al. Stacked denoising autoencoder enhanced polar codes over Rayleigh fading channels
Cérou et al. Experimental assessment of the reliability for watermarking and fingerprinting schemes
Ji et al. A principled approach to natural language watermarking
Kiyavash et al. Regular simplex fingerprints and their optimality properties
Meerwald et al. Towards joint decoding of Tardos fingerprinting codes
Berchtold et al. Performance and code length optimization of joint decoding Tardos fingerprinting
Kuribayashi et al. Universal scoring function based on bias equalizer for bias-based fingerprinting codes