{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T22:10:02Z","timestamp":1746137402909,"version":"3.40.4"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,2,19]],"date-time":"2014-02-19T00:00:00Z","timestamp":1392768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s10623-014-9937-5","type":"journal-article","created":{"date-parts":[[2014,2,18]],"date-time":"2014-02-18T03:13:58Z","timestamp":1392693238000},"page":"519-542","source":"Crossref","is-referenced-by-count":0,"title":["False positive probabilities in q-ary Tardos codes: comparison of attacks"],"prefix":"10.1007","volume":"75","author":[{"given":"Antonino","family":"Simone","sequence":"first","affiliation":[]},{"given":"Boris","family":"\u0160kori\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,19]]},"reference":[{"key":"9937_CR1","doi-asserted-by":"crossref","unstructured":"Amiri E., Tardos G.: High rate fingerprinting codes and the fingerprinting capacity. In: SODA 2009, pp. 336\u2013345 (2009).","DOI":"10.1137\/1.9781611973068.38"},{"key":"9937_CR2","doi-asserted-by":"crossref","unstructured":"Beaulieu N.C.: An infinite series for the computation of the complementary probability distribution function of a sum of independent random variables and its application to the sum of Rayleigh random variables. IEEE Trans. Commun. 38(9), 1463\u20131474 (1990).","DOI":"10.1109\/26.61387"},{"key":"9937_CR3","doi-asserted-by":"crossref","unstructured":"Blayer O., Tassa T.: Improved versions of Tardos\u2019 fingerprinting scheme. Des. Codes Cryptogr. 48(1), 79\u2013103 (2008).","DOI":"10.1007\/s10623-008-9200-z"},{"key":"9937_CR4","doi-asserted-by":"crossref","unstructured":"Boesten D., \u0160kori\u0107 B.: Asymptotic fingerprinting capacity for non-binary alphabets. In: Information Hiding 2011. Lecture Notes in Computer Science, vol. 6958, pp. 1\u201313. Springer, Berlin (2011).","DOI":"10.1007\/978-3-642-24178-9_1"},{"key":"9937_CR5","doi-asserted-by":"crossref","unstructured":"Boneh D., Shaw J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44(5), 1897\u20131905 (1998).","DOI":"10.1109\/18.705568"},{"key":"9937_CR6","doi-asserted-by":"crossref","unstructured":"C\u00e9rou F., Del Moral P., Furon T., Guyader A.: Sequential Monte Carlo for rare event estimation. Stat. Comput. 22(3), 795\u2013808 (2012).","DOI":"10.1007\/s11222-011-9231-6"},{"key":"9937_CR7","doi-asserted-by":"crossref","unstructured":"Charpentier A., Xie F., Fontaine C., Furon T.: Expectation maximization decoding of Tardos probabilistic fingerprinting code. In: SPIE Media Forensics and Security 2009, p. 72540 (2009).","DOI":"10.1117\/12.806034"},{"key":"9937_CR8","doi-asserted-by":"crossref","unstructured":"Furon T., Guyader A., C\u00e9rou F.: On the design and optimization of Tardos probabilistic fingerprinting codes. In: Information Hiding. LNCS, vol. 5284, pp. 341\u2013356. Springer, Berlin (2008).","DOI":"10.1007\/978-3-540-88961-8_24"},{"key":"9937_CR9","doi-asserted-by":"crossref","unstructured":"Furon T., P\u00e9rez-Freire L., Guyader A., C\u00e9rou F.: Estimating the minimal length of Tardos code. In: Information Hiding. LNCS, vol. 5806, pp. 176\u2013190. Springer, Berlin (2009).","DOI":"10.1007\/978-3-642-04431-1_13"},{"key":"9937_CR10","doi-asserted-by":"crossref","unstructured":"He S., Wu M.: Joint coding and embedding techniques for multimedia fingerprinting. TIFS 1, 231\u2013248 (2006).","DOI":"10.1109\/TIFS.2006.873597"},{"key":"9937_CR11","doi-asserted-by":"crossref","unstructured":"Huang Y.W., Moulin P.: Saddle-point solution of the fingerprinting capacity game under the marking assumption. In: ISIT 2009 (2009).","DOI":"10.1109\/ISIT.2009.5205882"},{"key":"9937_CR12","doi-asserted-by":"crossref","unstructured":"Huang Y.W., Moulin P.: On fingerprinting capacity games for arbitrary alphabets and their asymptotics. In: IEEE International Symposium on Information Theory (ISIT 2012). Cambridge, MA(2012).","DOI":"10.1109\/ISIT.2012.6283982"},{"key":"9937_CR13","doi-asserted-by":"crossref","unstructured":"Kilian J. Leighton F.T., Matheson L.R., Shamoon T.G., Tarjan R.E., Zane F.: Resistance of digital watermarks to collusive attacks. In: ISIT 1998, p. 271 (1998).","DOI":"10.1109\/ISIT.1998.708876"},{"key":"9937_CR14","unstructured":"Kolassa J.E.: Series Approximation Methods in Statistics. Springer, New York (2006)."},{"key":"9937_CR15","doi-asserted-by":"crossref","unstructured":"Meerwald P., Furon T.: Toward practical joint decoding of binary tardos fingerprinting codes. IEEE Trans. Inf. Forensics Security 7(4), 1168\u20131180 (2012).","DOI":"10.1109\/TIFS.2012.2195655"},{"key":"9937_CR16","doi-asserted-by":"crossref","unstructured":"Moulin P.: Universal fingerprinting: capacity and random-coding exponents. Preprint, arXiv:0801.3837 v2 (2008).","DOI":"10.1109\/ISIT.2008.4594980"},{"key":"9937_CR17","unstructured":"Nuida K., Hagiwara M., Watanabe H., Imai H.: Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature. In: CoRR, abs\/cs\/0610036 (2006)."},{"key":"9937_CR18","doi-asserted-by":"crossref","unstructured":"Schaathun H.G.: On error-correcting fingerprinting codes for use with watermarking. Multimed. Syst. 13(5\u20136), 331\u2013344 (2008).","DOI":"10.1007\/s00530-007-0096-7"},{"key":"9937_CR19","doi-asserted-by":"crossref","unstructured":"Simone A., \u0160kori\u0107 B.: Asymptotically false-positive-maximizing attack on non-binary Tardos codes. In: Information Hiding, pp. 14\u201327 (2011).","DOI":"10.1007\/978-3-642-24178-9_2"},{"key":"9937_CR20","doi-asserted-by":"crossref","unstructured":"Simone A., \u0160kori\u0107 B.: Accusation probabilities in Tardos codes: beyond the Gaussian approximation. Des. Codes Cryptogr. 63(3), 379\u2013412 (2012).","DOI":"10.1007\/s10623-011-9563-4"},{"key":"9937_CR21","doi-asserted-by":"crossref","unstructured":"Somekh-Baruch A., Merhav N.: On the capacity game of private fingerprinting systems under collusion attacks. IEEE Trans. Inf. Theory 51, 884\u2013899 (2005).","DOI":"10.1109\/TIT.2004.842702"},{"key":"9937_CR22","doi-asserted-by":"crossref","unstructured":"Tardos G.: Optimal probabilistic fingerprint codes. In: STOC 2003, pp. 116\u2013125 (2003).","DOI":"10.1145\/780542.780561"},{"key":"9937_CR23","doi-asserted-by":"crossref","unstructured":"\u0160kori\u0107 B., Katzenbeisser S., Celik M.U.: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr. 46(2), 137\u2013166 (2008).","DOI":"10.1007\/s10623-007-9142-x"},{"key":"9937_CR24","doi-asserted-by":"crossref","unstructured":"\u0160kori\u0107 B., Oosterwijk J.: Binary and q-ary Tardos codes, revisited. http:\/\/arxiv.org\/abs\/cs\/0610036v1 . Accessed 14 Feb 2014.","DOI":"10.1007\/s10623-013-9842-3"},{"key":"9937_CR25","doi-asserted-by":"crossref","unstructured":"\u0160kori\u0107 B., Vladimirova T.U., Celik M.U., Talstra J.C.: Tardos fingerprinting is better than we thought. IEEE Trans. Inf. Theory 54(8), 3663\u20133676 (2008).","DOI":"10.1109\/TIT.2008.926307"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9937-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-014-9937-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9937-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T21:40:14Z","timestamp":1746135614000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-014-9937-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,19]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["9937"],"URL":"https:\/\/doi.org\/10.1007\/s10623-014-9937-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2014,2,19]]}}}