Mostra el registre d'ítem simple
Use of Turbo Codes with Low-Rate Convolutional Constituent Codes in Fingerprinting Scenarios
dc.contributor.author | Tomás Buliart, Joan |
dc.contributor.author | Gómez Muro, Ana |
dc.contributor.author | Fernández Muñoz, Marcel |
dc.contributor.author | Soriano Ibáñez, Miguel |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica |
dc.date.accessioned | 2012-01-17T17:48:47Z |
dc.date.available | 2012-01-17T17:48:47Z |
dc.date.created | 2011 |
dc.date.issued | 2011 |
dc.identifier.citation | Tomàs-Buliart, J. [et al.]. Use of Turbo Codes with Low-Rate Convolutional Constituent Codes in Fingerprinting Scenarios. A: Information Forensics and Security. "Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security". IEEE, 2011, p. 1-6. |
dc.identifier.isbn | 978-1-4577-1019-3 |
dc.identifier.uri | http://hdl.handle.net/2117/14609 |
dc.description.abstract | We discuss the use of turbo codes in fingerprinting schemes. More precisely, we present a family of turbo codes that are secure against attacking coalitions of size 2. This family is build upon a class of low-rate convolutional codes with maximum free distance. Low rate convolutional codes are commonly used in code-spread CDMA applications. Moreover, we show how efficient traitor tracing can be performed by means of the turbo decoding algorithm. |
dc.format.extent | 6 p. |
dc.language.iso | eng |
dc.publisher | IEEE |
dc.subject | Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors::Trànsit de dades |
dc.subject.lcsh | Data compression (Telecommunication) |
dc.subject.lcsh | Error-correcting codes (Information theory) |
dc.title | Use of Turbo Codes with Low-Rate Convolutional Constituent Codes in Fingerprinting Scenarios |
dc.type | Conference lecture |
dc.subject.lemac | Dades -- Compressió (Telecomunicació) |
dc.subject.lemac | Codis de correcció d'errors (Teoria de la informació) |
dc.contributor.group | Universitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics |
dc.identifier.doi | 10.1109/WIFS.2011.6123142 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6123142 |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 9416956 |
dc.description.version | Postprint (published version) |
local.citation.author | Tomàs-Buliart, J.; Gómez-Muro, A.; Fernandez, M.; Soriano, M. |
local.citation.contributor | Information Forensics and Security |
local.citation.publicationName | Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security |
local.citation.startingPage | 1 |
local.citation.endingPage | 6 |