{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T17:25:16Z","timestamp":1648920316611},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,7,11]],"date-time":"2013-07-11T00:00:00Z","timestamp":1373500800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s10623-013-9856-x","type":"journal-article","created":{"date-parts":[[2013,7,10]],"date-time":"2013-07-10T12:22:44Z","timestamp":1373458964000},"page":"159-182","source":"Crossref","is-referenced-by-count":0,"title":["False Negative probabilities in Tardos codes"],"prefix":"10.1007","volume":"74","author":[{"given":"Antonino","family":"Simone","sequence":"first","affiliation":[]},{"given":"Boris","family":"\u0160kori\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,11]]},"reference":[{"key":"9856_CR1","doi-asserted-by":"crossref","unstructured":"Amiri E., Tardos G.: High rate fingerprinting codes and the fingerprinting capacity. In: ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 336\u2013345 (2009).","DOI":"10.1137\/1.9781611973068.38"},{"key":"9856_CR2","doi-asserted-by":"crossref","unstructured":"Blayer O., Tassa T.: Improved versions of Tardos\u2019 fingerprinting scheme. Des. Codes Cryptogr. 48(1), 79\u2013103 (2008).","DOI":"10.1007\/s10623-008-9200-z"},{"key":"9856_CR3","unstructured":"Boesten D., \u0160kori\u0107 B.: Asymptotic fingerprinting capacity for non-binary alphabets. In: Information Hiding. Lecture Notes in Computer Science, vol. 6958, pp. 1\u201313. Springer, Heidelberg (2011)."},{"key":"9856_CR4","unstructured":"Boneh D., Shaw J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44(5), 1897\u20131905 (1998)."},{"key":"9856_CR5","unstructured":"Charpentier A., Xie F., Fontaine C., Furon T.: Expectation maximization decoding of Tardos probabilistic fingerprinting code. In: SPIE Proceedings of Media Forensics and Security, vol. 7254, p. 72540 (2009)."},{"key":"9856_CR6","doi-asserted-by":"crossref","unstructured":"Furon T., P\u00e9rez-Freire L.: Worst case attacks against binary probabilistic traitor tracing codes. In: IEEE Workshop on Information Forensics and Security (WIFS). http:\/\/arxiv.org\/abs\/0903.3480 (2009).","DOI":"10.1109\/WIFS.2009.5386484"},{"key":"9856_CR7","unstructured":"Furon T., P\u00e9rez-Freire L., Guyader A., C\u00e9rou F.: Estimating the minimal length of Tardos code. In: Information Hiding. Lecture Notes in Computer Science, vol. 5806, pp. 176\u2013190. Springer, Berlin (2009)."},{"key":"9856_CR8","unstructured":"Furon T., Guyader A., C\u00e9rou F.: On the design and optimization of Tardos probabilistic fingerprinting codes. In: Information Hiding. Lecture Notes in Computer Science, vol. 5284, pp. 341\u2013356. Springer, Berlin (2008)."},{"key":"9856_CR9","unstructured":"Gradshteyn I.S., Ryzhik I.M.: Table of Integrals, Series, and Products, 5th edn. Academic Press, New York (1994)."},{"key":"9856_CR10","doi-asserted-by":"crossref","unstructured":"He S., Wu M.: Joint coding and embedding techniques for multimedia fingerprinting. IEEE Trans. Inf. Forensics Secur. 1, 231\u2013248 (2006).","DOI":"10.1109\/TIFS.2006.873597"},{"key":"9856_CR11","unstructured":"Hollmann H.D.L., van Lint J.H., Linnartz J.-P., Tolhuizen L.M.G.M.: On codes with the identifiable parent property. J. Comb. Theory 82, 472\u2013479 (1998)."},{"key":"9856_CR12","doi-asserted-by":"crossref","unstructured":"Huang Y.W., Moulin P.: On fingerprinting capacity games for arbitrary alphabets and their asymptotics. In: IEEE International Symposium on Information Theory (ISIT), pp. 2571\u20132575 (2012).","DOI":"10.1109\/ISIT.2012.6283982"},{"key":"9856_CR13","doi-asserted-by":"crossref","unstructured":"Huang Y.W., Moulin P.: Saddle-point solution of the fingerprinting capacity game under the marking assumption. In: IEEE International Symposium on Information Theory (ISIT), pp. 2256\u20132260 (2009).","DOI":"10.1109\/ISIT.2009.5205882"},{"key":"9856_CR14","unstructured":"Kilian J., Leighton F.T., Matheson L.R., Shamoon T.G., Tarjan R.E., Zane F.: Resistance of digital watermarks to collusive attacks. In: IEEE International Symposium on Information Theory (ISIT), p. 271 (1998)."},{"key":"9856_CR15","doi-asserted-by":"crossref","unstructured":"Kuribayashi M., Akashi N., Morii M.: On the systematic generation of Tardos\u2019s fingerprinting codes. In: IEEE International Workshop on Multimedia Signal Processing (MMSP), pp. 748\u2013753 (2008).","DOI":"10.1109\/MMSP.2008.4665174"},{"key":"9856_CR16","doi-asserted-by":"crossref","unstructured":"Laarhoven T., de Weger B.: Optimal symmetric Tardos traitor tracing schemes. Des. Codes Cryptogr. (2012). doi: 10.1007\/s10623-012-9718-y .","DOI":"10.1007\/s10623-012-9718-y"},{"key":"9856_CR17","unstructured":"Laarhoven T., Doumen J., Roelse P., \u0160kori\u0107 B., de Weger B.M.M.: Dynamic Tardos traitor tracing schemes. IEEE Trans. Inf. Theory 59, 1\u201313 (2013)."},{"key":"9856_CR18","unstructured":"Meerwald P., Furon T.: Towards joint Tardos decoding: the \u2018Don Quixote\u2019 algorithm. In: Information Hiding. Lecture Notes in Computer Science, vol. 6958, pp. 28\u201342. Springer, Prague (2011)."},{"key":"9856_CR19","doi-asserted-by":"crossref","unstructured":"Moulin P.: Universal fingerprinting: capacity and random-coding exponents. http:\/\/arxiv.org\/abs\/0801.3837 (2008).","DOI":"10.1109\/ISIT.2008.4594980"},{"key":"9856_CR20","unstructured":"Nuida K.: Short collusion-secure fingerprint codes against three pirates. In: Information Hiding. Lecture Notes in Computer Science, vol. 6387, pp. 86\u2013102. Springer, Calgary (2010)."},{"key":"9856_CR21","unstructured":"Nuida K., Hagiwara M., Watanabe H., Imai H.: Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature. CoRR, abs\/cs\/0610036 (2006)."},{"key":"9856_CR22","unstructured":"Prudnikov A.P., Brychkov Y.A., Marichev O.I.: Integrals and Series, vol. 1. CRC Press, Boca Raton (1994)."},{"key":"9856_CR23","doi-asserted-by":"crossref","unstructured":"Schaathun H.G.: On error-correcting fingerprinting codes for use with watermarking. Multimedia Syst. 13(5\u20136), 331\u2013344 (2008).","DOI":"10.1007\/s00530-007-0096-7"},{"key":"9856_CR24","unstructured":"Simone A., \u0160kori\u0107 B.: Asymptotically false-positive-maximizing attack on non-binary Tardos codes. In: Information Hiding. Lecture Notes in Computer Science, vol. 6958, pp. 14\u201327. Springer, Berlin (2011)."},{"key":"9856_CR25","doi-asserted-by":"crossref","unstructured":"Simone A., \u0160kori\u0107 B.: Accusation probabilities in Tardos codes: beyond the Gaussian approximation. Des. Codes Cryptogr. 63(3), 379\u2013412 (2012).","DOI":"10.1007\/s10623-011-9563-4"},{"key":"9856_CR26","unstructured":"Simone A., \u0160kori\u0107 B.: False Positive probabilities in q-ary Tardos codes: comparison of attacks. http:\/\/eprint.iacr.org\/2012\/522 (2012)."},{"key":"9856_CR27","unstructured":"Somekh-Baruch A., Merhav N.: On the capacity game of private fingerprinting systems under collusion attacks. IEEE Trans. Inf. Theory 51, 884\u2013899 (2005)."},{"key":"9856_CR28","doi-asserted-by":"crossref","unstructured":"Tardos G.: Optimal probabilistic fingerprint codes. In: ACM Symposium on Theory of Computing (STOC), pp. 116\u2013125 (2003).","DOI":"10.1145\/780559.780561"},{"key":"9856_CR29","doi-asserted-by":"crossref","unstructured":"\u0160kori\u0107 B., Katzenbeisser S., Celik M.U.: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr. 46(2), 137\u2013166 (2008).","DOI":"10.1007\/s10623-007-9142-x"},{"key":"9856_CR30","doi-asserted-by":"crossref","unstructured":"\u0160kori\u0107 B., Katzenbeisser S., Schaathun H.G., Celik M.U.: Tardos fingerprinting codes in the combined digit model. In: IEEE Workshop on Information Forensics and Security (WIFS), pp. 41\u201345 (2009)","DOI":"10.1109\/WIFS.2009.5386485"},{"key":"9856_CR31","unstructured":"\u0160kori\u0107 B., Vladimirova T.U., Celik M.U., Talstra J.C.: Tardos fingerprinting is better than we thought. IEEE Trans. Inf. Theory 54(8), 3663\u20133676 (2008)."},{"key":"9856_CR32","doi-asserted-by":"crossref","unstructured":"Xie F., Furon T., Fontaine C.: On-off keying modulation and Tardos fingerprinting. In: ACM Workshop on Multimedia and Security (MM &Sec), pp. 101\u2013106 (2008).","DOI":"10.1145\/1411328.1411347"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9856-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-013-9856-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9856-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T00:32:30Z","timestamp":1563409950000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-013-9856-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,11]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["9856"],"URL":"https:\/\/doi.org\/10.1007\/s10623-013-9856-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,11]]}}}