{"id":"https://openalex.org/W2771761778","doi":"https://doi.org/10.1109/tifs.2017.2779112","title":"Fingerprinting Codes Under the Weak Marking Assumption","display_name":"Fingerprinting Codes Under the Weak Marking Assumption","publication_year":2017,"publication_date":"2017-11-30","ids":{"openalex":"https://openalex.org/W2771761778","doi":"https://doi.org/10.1109/tifs.2017.2779112","mag":"2771761778"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2779112","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2779112","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102810173","display_name":"G\u00e1bor Fodor","orcid":"https://orcid.org/0000-0002-2934-5390"},"institutions":[{"id":"https://openalex.org/I13469542","display_name":"Vrije Universiteit Brussel","ror":"https://ror.org/006e5kg04","country_code":"BE","type":"education","lineage":["https://openalex.org/I13469542"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Gabor Fodor","raw_affiliation_strings":["Department of Electronics and Informatics, Vrije Universiteit Brussel, Brussels, Belgium"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Informatics, Vrije Universiteit Brussel, Brussels, Belgium","institution_ids":["https://openalex.org/I13469542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034083500","display_name":"Peter Schelkens","orcid":"https://orcid.org/0000-0003-0908-1655"},"institutions":[{"id":"https://openalex.org/I13469542","display_name":"Vrije Universiteit Brussel","ror":"https://ror.org/006e5kg04","country_code":"BE","type":"education","lineage":["https://openalex.org/I13469542"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Peter Schelkens","raw_affiliation_strings":["Department of Electronics and Informatics, Vrije Universiteit Brussel, Brussels, Belgium"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Informatics, Vrije Universiteit Brussel, Brussels, Belgium","institution_ids":["https://openalex.org/I13469542"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054878147","display_name":"Ann Dooms","orcid":"https://orcid.org/0000-0002-2962-9393"},"institutions":[{"id":"https://openalex.org/I13469542","display_name":"Vrije Universiteit Brussel","ror":"https://ror.org/006e5kg04","country_code":"BE","type":"education","lineage":["https://openalex.org/I13469542"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Ann Dooms","raw_affiliation_strings":["Department of Mathematics, Vrije Universiteit Brussel, Brussels, Belgium"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Vrije Universiteit Brussel, Brussels, Belgium","institution_ids":["https://openalex.org/I13469542"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102810173"],"corresponding_institution_ids":["https://openalex.org/I13469542"],"apc_list":null,"apc_paid":null,"fwci":0.182,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.58547488,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"13","issue":"6","first_page":"1495","last_page":"1508"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7073723077774048},{"id":"https://openalex.org/keywords/false-accusation","display_name":"False accusation","score":0.60389643907547},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5835338830947876},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5782454013824463},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5063618421554565},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.5047470331192017},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.4705308675765991},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45726335048675537},{"id":"https://openalex.org/keywords/channel-code","display_name":"Channel code","score":0.4212532639503479},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.41733086109161377},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.33468884229660034},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2614666223526001},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11825001239776611},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.10990804433822632}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7073723077774048},{"id":"https://openalex.org/C59577422","wikidata":"https://www.wikidata.org/wiki/Q10265143","display_name":"False accusation","level":2,"score":0.60389643907547},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5835338830947876},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5782454013824463},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5063618421554565},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.5047470331192017},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.4705308675765991},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45726335048675537},{"id":"https://openalex.org/C166366890","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Channel code","level":3,"score":0.4212532639503479},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.41733086109161377},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.33468884229660034},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2614666223526001},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11825001239776611},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.10990804433822632},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2017.2779112","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2779112","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:vubissmart:VUBISSMART:2000:142402","is_oa":false,"landing_page_url":"https://biblio.vub.ac.be/vubir/fingerprinting-codes-under-the-weak-marking-assumption(8ff87b95-751b-44ed-897b-ea78dd1991be).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306402573","display_name":"VUBIR (Vrije Universiteit Brussel)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I13469542","host_organization_name":"Vrije Universiteit Brussel","host_organization_lineage":["https://openalex.org/I13469542"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W99578095","https://openalex.org/W1498588281","https://openalex.org/W1510640641","https://openalex.org/W1511872552","https://openalex.org/W1513304865","https://openalex.org/W1541113101","https://openalex.org/W1546855683","https://openalex.org/W1560505065","https://openalex.org/W1576719778","https://openalex.org/W1604644382","https://openalex.org/W1704831432","https://openalex.org/W1968422945","https://openalex.org/W1977832049","https://openalex.org/W1987075122","https://openalex.org/W1996893600","https://openalex.org/W2018225254","https://openalex.org/W2020150968","https://openalex.org/W2025381528","https://openalex.org/W2031722321","https://openalex.org/W2047411082","https://openalex.org/W2067406471","https://openalex.org/W2069222715","https://openalex.org/W2080034813","https://openalex.org/W2087879325","https://openalex.org/W2092811336","https://openalex.org/W2118032825","https://openalex.org/W2131324012","https://openalex.org/W2134195444","https://openalex.org/W2143856740","https://openalex.org/W2145102561","https://openalex.org/W2145394791","https://openalex.org/W2151066003","https://openalex.org/W2152545485","https://openalex.org/W2157531972","https://openalex.org/W2158680153","https://openalex.org/W2164512702","https://openalex.org/W2533442850","https://openalex.org/W2911546054","https://openalex.org/W2963373157","https://openalex.org/W3099340116","https://openalex.org/W3099456911","https://openalex.org/W4230677855","https://openalex.org/W4241113346","https://openalex.org/W6667462028","https://openalex.org/W7036235337"],"related_works":["https://openalex.org/W2347470716","https://openalex.org/W2358352302","https://openalex.org/W2364398989","https://openalex.org/W2009938035","https://openalex.org/W2370485136","https://openalex.org/W3033622421","https://openalex.org/W2154612888","https://openalex.org/W1985968643","https://openalex.org/W2152012878","https://openalex.org/W2133231244"],"abstract_inverted_index":{"Fingerprinting":[0],"codes":[1],"based":[2],"on":[3,60,96],"the":[4,48,56,61,72,80,97,106,110,121,125,133,136,142,152,155],"marking":[5,49,81,126,156],"assumption":[6,82,127],"provide":[7,105],"reliable":[8],"security":[9],"against":[10,16],"collusion":[11],"attacks,":[12],"but":[13],"lack":[14],"resilience":[15],"channel":[17],"errors":[18,42,74],"such":[19],"as":[20,83],"symbol":[21],"erasures":[22],"or":[23,33],"other":[24],"forms":[25],"of":[26,40,66,79,100,124,135,146,154],"distortions":[27],"introduced":[28],"by":[29,46,85],"transmission":[30],"over":[31],"noisy":[32],"insecure":[34],"communication":[35],"channels.":[36],"This":[37],"additional":[38],"source":[39],"distortion":[41,73],"can":[43],"be":[44],"addressed":[45],"relaxing":[47],"assumption.":[50,157],"In":[51],"this":[52,76],"paper":[53],"we":[54],"examine":[55],"restrictions":[57],"and":[58,71,87],"limitations":[59],"code":[62,98,115,143,149],"construction":[63],"in":[64],"terms":[65],"accusation":[67,118],"errors,":[68],"alphabet":[69],"size,":[70],"under":[75,120,151],"weaker":[77,122],"form":[78,123],"formulated":[84],"Guth":[86],"Pfitzmann,":[88],"also":[89],"deriving":[90],"a":[91],"theoretical":[92],"minimum":[93,148],"lower":[94],"bound":[95],"length":[99,150],"q-ary":[101],"fingerprinting":[102],"codes.":[103],"We":[104,139],"formulas":[107],"for":[108],"applying":[109],"already":[111],"existing":[112],"binary":[113],"Tardos":[114],"with":[116,129],"symmetric":[117],"function":[119],"along":[128],"numerical":[130],"results":[131],"proving":[132],"tightness":[134],"derived":[137],"bounds.":[138],"show":[140],"that":[141],"is":[144],"still":[145],"asymptotically":[147],"relaxation":[153]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
