Pérez-Freire et al., 2009 - Google Patents
Blind decoder for binary probabilistic traitor tracing codesPérez-Freire et al., 2009
View PDF- Document ID
- 2265828253587859139
- Author
- Pérez-Freire L
- Furon T
- Publication year
- Publication venue
- 2009 First IEEE International Workshop on Information Forensics and Security (WIFS)
External Links
Snippet
This paper presents a new decoder for probabilistic binary traitor tracing codes which is based on classical hypothesis testing and estimation theory. This new decoder is blind, in the sense of ignoring a priori the collusion attack it is facing. It basically performs a joint …
- 238000000034 method 0 description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Amiri et al. | High rate fingerprinting codes and the fingerprinting capacity | |
Moulin | Universal fingerprinting: Capacity and random-coding exponents | |
Bhattacharyya et al. | A second order cone programming formulation for classifying missing data | |
Zhan et al. | Anomaly detection in dynamic systems using weak estimators | |
CN112907431B (en) | Steganalysis method for robust countersteganalysis | |
CN118118254A (en) | APT attack detection method and system based on traceability graph behavior sequence prediction | |
Pérez-Freire et al. | Blind decoder for binary probabilistic traitor tracing codes | |
Alnajjab et al. | Attacks on sensor network parameter estimation with quantization: Performance and asymptotically optimum processing | |
Zargarbashi et al. | Robust yet efficient conformal prediction sets | |
Furon et al. | Estimating the minimal length of Tardos code | |
Meerwald et al. | Towards joint Tardos decoding: the ‘Don Quixote’algorithm | |
Oosterwijk et al. | Optimal suspicion functions for Tardos traitor tracing schemes | |
CN118869322A (en) | A fine-grained attack behavior detection method for large-scale networks | |
Furon et al. | EM decoding of Tardos traitor tracing codes | |
Nolte et al. | The cool and the cruel: separating hard parts of LWE secrets | |
Zhu et al. | Deep learning for waveform level receiver design with natural redundancy | |
Park et al. | SignSGD with federated defense: Harnessing adversarial attacks through gradient sign decoding | |
Furon et al. | Decoding fingerprints using the Markov chain Monte Carlo method | |
Li et al. | Stacked denoising autoencoder enhanced polar codes over Rayleigh fading channels | |
Cérou et al. | Experimental assessment of the reliability for watermarking and fingerprinting schemes | |
Ji et al. | A principled approach to natural language watermarking | |
Kiyavash et al. | Regular simplex fingerprints and their optimality properties | |
Meerwald et al. | Towards joint decoding of Tardos fingerprinting codes | |
Berchtold et al. | Performance and code length optimization of joint decoding Tardos fingerprinting | |
Kuribayashi et al. | Universal scoring function based on bias equalizer for bias-based fingerprinting codes |