{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T04:25:08Z","timestamp":1741839908709,"version":"3.38.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s10623-011-9563-4","type":"journal-article","created":{"date-parts":[[2011,10,19]],"date-time":"2011-10-19T15:04:42Z","timestamp":1319036682000},"page":"379-412","source":"Crossref","is-referenced-by-count":15,"title":["Accusation probabilities in Tardos codes: beyond the Gaussian approximation"],"prefix":"10.1007","volume":"63","author":[{"given":"Antonino","family":"Simone","sequence":"first","affiliation":[]},{"given":"Boris","family":"\u0160kori\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,10,20]]},"reference":[{"key":"9563_CR1","unstructured":"Alfaro P.C.: Side-informed data hiding: robustness and security analysis. PhD thesis, Universidade de Vigo (2006)."},{"key":"9563_CR2","doi-asserted-by":"crossref","unstructured":"Amiri E., Tardos G.: High rate fingerprinting codes and the fingerprinting capacity. In: Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 336\u2013345 (2009).","DOI":"10.1137\/1.9781611973068.38"},{"issue":"9","key":"9563_CR3","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1109\/26.61387","volume":"38","author":"N.C. Beaulieu","year":"1990","unstructured":"Beaulieu N.C.: An infinite series for the computation of the complementary probability distribution function of a sum of independent random variables and its application to the sum of Rayleigh random variables. IEEE Trans. Commun. 38(9), 1463\u20131474 (1990)","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"9563_CR4","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s10623-008-9200-z","volume":"48","author":"O. Blayer","year":"2008","unstructured":"Blayer O., Tassa T.: Improved versions of Tardos\u2019 fingerprinting scheme. Des. Codes Cryptogr. 48(1), 79\u2013103 (2008)","journal-title":"Des. Codes Cryptogr."},{"issue":"5","key":"9563_CR5","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh D., Shaw J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44(5), 1897\u20131905 (1998)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9563_CR6","unstructured":"Furon T., Guyader A., C\u00e9rou, F.: On the design and optimization of Tardos probabilistic fingerprinting codes. In: Information Hiding, volume 5284 of Lecture Notes in Computer Science, pp. 341\u2013356. Springer (2008)."},{"key":"9563_CR7","unstructured":"Furon T., P\u00e9rez-Freire L., Guyader A., C\u00e9rou, F.: Estimating the minimal length of Tardos code. In: Information Hiding, volume 5806 of Lecture Notes in Computer Science, pp. 176\u2013190. Springer (2009)."},{"key":"9563_CR8","volume-title":"Table of Integrals, Series, and Products","author":"I.S. Gradshteyn","year":"1994","unstructured":"Gradshteyn I.S., Ryzhik I.M.: Table of Integrals, Series, and Products, 5th edn. Academic Press, San Diego (1994)","edition":"5"},{"key":"9563_CR9","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/TIFS.2006.873597","volume":"1","author":"S. He","year":"2006","unstructured":"He S., Wu M.: Joint coding and embedding techniques for multimedia fingerprinting. IEEE Trans. Inf. Forensics Secur. 1, 231\u2013248 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9563_CR10","doi-asserted-by":"crossref","unstructured":"Huang Y.-W., Moulin P.: Maximin optimality of the arcsine fingerprinting distribution and the interleaving attack for large coalitions. In: IEEE International Workshop on Information Forensics and Security, pp. 1\u20136 (2010).","DOI":"10.1109\/WIFS.2010.5711451"},{"key":"9563_CR11","doi-asserted-by":"crossref","unstructured":"Huang Y.W., Moulin P.: Saddle-point solution of the fingerprinting capacity game under the marking assumption. In: IEEE International Symposium on Information Theory (2009).","DOI":"10.1109\/ISIT.2009.5205882"},{"key":"9563_CR12","doi-asserted-by":"crossref","unstructured":"Huang Y.W., Moulin P.: Saddle-point solution of the fingerprinting capacity game under the marking assumption. http:\/\/arxiv.org\/abs\/0905.1375 (2009).","DOI":"10.1109\/ISIT.2009.5205882"},{"key":"9563_CR13","doi-asserted-by":"crossref","unstructured":"Kilian J., Leighton F.T., Matheson L.R., Shamoon T.G., Tarjan R.E., Zane F.: Resistance of digital watermarks to collusive attacks. In: IEEE International Symposium on Information Theory, p. 271 (1998).","DOI":"10.1109\/ISIT.1998.708876"},{"key":"9563_CR14","doi-asserted-by":"crossref","unstructured":"Kuribayashi M., Akashi N., Morii M.: On the systematic generation of Tardos\u2019s fingerprinting codes. In: International Workshop on Multimedia Signal Processing, pp. 748\u2013753 (2008).","DOI":"10.1109\/MMSP.2008.4665174"},{"key":"9563_CR15","volume-title":"Characteristic Functions","author":"E. Lukacs","year":"1960","unstructured":"Lukacs E.: Characteristic Functions. Statistical monographs & courses. Griffin, London (1960)"},{"key":"9563_CR16","doi-asserted-by":"crossref","unstructured":"Moulin P.: Universal fingerprinting: capacity and random-coding exponents. Preprint arXiv:0801.3837v2, available at http:\/\/arxiv.org\/abs\/0801.3837 (2008).","DOI":"10.1109\/ISIT.2008.4594980"},{"key":"9563_CR17","unstructured":"Nuida K., Hagiwara M., Watanabe H., Imai H.: Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature. CoRR, abs\/cs\/0610036, http:\/\/arxiv.org\/abs\/cs\/0610036 (2006)."},{"key":"9563_CR18","volume-title":"Integrals and Series, 4th printing, vol. 1","author":"A.P. Prudnikov","year":"1998","unstructured":"Prudnikov A.P., Brychkov Yu.A., Marichev O.I.: Integrals and Series, 4th printing, vol. 1. CRC Press, Boca Raton (1998)"},{"issue":"5\u20136","key":"9563_CR19","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/s00530-007-0096-7","volume":"13","author":"H.G. Schaathun","year":"2008","unstructured":"Schaathun H.G.: On error-correcting fingerprinting codes for use with watermarking. Multimedia Syst. 13(5\u20136), 331\u2013344 (2008)","journal-title":"Multimedia Syst."},{"issue":"2","key":"9563_CR20","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10623-007-9142-x","volume":"46","author":"B. \u0160kori\u0107","year":"2008","unstructured":"\u0160kori\u0107 B., Katzenbeisser S., Celik M.U.: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr. 46(2), 137\u2013166 (2008)","journal-title":"Des. Codes Cryptogr."},{"key":"9563_CR21","unstructured":"\u0160kori\u0107 B., Vladimirova T.U., Celik M.U., Talstra J.C.: Tardos fingerprinting is better than we thought. IEEE Trans. Inf. Theory 54(8), 3663\u20133676 (2008)."},{"key":"9563_CR22","doi-asserted-by":"crossref","first-page":"884","DOI":"10.1109\/TIT.2004.842702","volume":"51","author":"A. Somekh-Baruch","year":"2005","unstructured":"Somekh-Baruch A., Merhav N.: On the capacity game of private fingerprinting systems under collusion attacks. IEEE Trans. Inf. Theory 51, 884\u2013899 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9563_CR23","doi-asserted-by":"crossref","unstructured":"Tardos G.: Optimal probabilistic fingerprint codes. In: ACM Symposium on Theory of Computing, pp. 116\u2013125 (2003)","DOI":"10.1145\/780542.780561"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/s10623-011-9563-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T02:39:08Z","timestamp":1741833548000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-011-9563-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,20]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["9563"],"URL":"https:\/\/doi.org\/10.1007\/s10623-011-9563-4","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2011,10,20]]}}}