Worst case attacks against binary probabilistic traitor tracing codes.
Teddy FuronLuis Pérez-FreirePublished in: WIFS (2009)
Keyphrases
- worst case
- upper bound
- error correcting
- average case
- countermeasures
- logical operations
- lower bound
- probabilistic model
- probabilistic logic
- generative model
- watermarking scheme
- error correction
- bayesian networks
- continuous valued
- non binary
- decoding algorithm
- traffic analysis
- approximation algorithms
- uncertain data
- np hard
- error correcting codes
- worst case analysis
- objective function
- malicious attacks
- neural network
- malicious users