Mostra el registre d'ítem simple
Improved existence bounds on IPP codes using the Clique Lovász Local Lemma
dc.contributor.author | Aranda, Castor |
dc.contributor.author | Fernández Muñoz, Marcel |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica |
dc.date.accessioned | 2018-02-27T14:34:23Z |
dc.date.issued | 2017 |
dc.identifier.citation | Aranda, C., Fernandez, M. Improved existence bounds on IPP codes using the Clique Lovász Local Lemma. A: IEEE International Symposium on Information Theory. "2017 IEEE International Symposium on InformationTheory (ISIT 2017): Aachen, Germany: 25-30 June 2017". Aachen: Institute of Electrical and Electronics Engineers (IEEE), 2017, p. 3160-3164. |
dc.identifier.isbn | 978-1-5090-4097-1 |
dc.identifier.uri | http://hdl.handle.net/2117/114551 |
dc.description.abstract | Nowadays, one of the biggest problems that challenges distributors of digital content is, precisely, protecting such content against redistribution. Those who trade with any of the multiple digital information formats (audio, video, software, text, etc.) face one danger: once a copy of the content is purchased by a client, this user may illegally redistribute it. This way, a distributor of digital content with intellectual property rights must take some steps to ensure the preservation of its business and, given that the use and benefit of a legally purchased copy of the content by a client implies reading the data (either with a computer, a DVD player, or any other device), anti-copy protection of such copyrighted content is not viable. Here is where new mechanics such as fingerprinting (first presented in [18]) take place: instead of distributing identical copies of the data, fingerprinting consists of embedding a series of marks on each copy, with each mark unique for each user and keeping record of which mark is received by which user, thus dissuading them from redistributing the files, under the threat of being caught. Once the distributor intercepts an illegally distributed copy, he will be able to read the marks to determine which user is guilty, and therefore, the user is labelled as a traitor. |
dc.format.extent | 5 p. |
dc.language.iso | eng |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica |
dc.subject.lcsh | Information theory |
dc.subject.lcsh | Computer security |
dc.subject.other | Identifying parent property |
dc.subject.other | Fingerprinting codes |
dc.subject.other | Lovasz Local Lemma |
dc.title | Improved existence bounds on IPP codes using the Clique Lovász Local Lemma |
dc.type | Conference report |
dc.subject.lemac | Informació, Teoria de la |
dc.subject.lemac | Seguretat informàtica |
dc.contributor.group | Universitat Politècnica de Catalunya. ISG - Grup de Seguretat de la Informació |
dc.identifier.doi | 10.1109/ISIT.2017.8007112 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | http://ieeexplore.ieee.org/document/8007112/ |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 21981689 |
dc.description.version | Postprint (published version) |
dc.relation.projectid | info:eu-repo/grantAgreement/MINECO//TEC2015-68734-R/ES/ANALISIS FORENSE AVANZADO/ |
dc.date.lift | 10000-01-01 |
local.citation.author | Aranda, C.; Fernandez, M. |
local.citation.contributor | IEEE International Symposium on Information Theory |
local.citation.pubplace | Aachen |
local.citation.publicationName | 2017 IEEE International Symposium on InformationTheory (ISIT 2017): Aachen, Germany: 25-30 June 2017 |
local.citation.startingPage | 3160 |
local.citation.endingPage | 3164 |