{"id":"https://openalex.org/W2953272630","doi":"https://doi.org/10.1109/wifs.2009.5386485","title":"Tardos fingerprinting codes in the combined digit model","display_name":"Tardos fingerprinting codes in the combined digit model","publication_year":2009,"publication_date":"2009-12-01","ids":{"openalex":"https://openalex.org/W2953272630","doi":"https://doi.org/10.1109/wifs.2009.5386485","mag":"2953272630"},"language":"en","primary_location":{"id":"doi:10.1109/wifs.2009.5386485","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2009.5386485","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 First IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.tue.nl/en/publications/cfbebbcf-5abf-4713-8c6c-19bdcf39a7a0","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013767254","display_name":"Boris \u0160kori\u0107","orcid":"https://orcid.org/0000-0003-1409-4127"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Boris Skoric","raw_affiliation_strings":["Eindhovan University of Technology, Eindhoven, Netherlands","Dept. of Math & Comput. Sci., Eindhoven Univ. of Technol., Eindhoven, Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Eindhovan University of Technology, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]},{"raw_affiliation_string":"Dept. of Math & Comput. Sci., Eindhoven Univ. of Technol., Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036400192","display_name":"Stefan Katzenbeisser","orcid":"https://orcid.org/0009-0005-3608-874X"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stefan Katzenbeisser","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","Security Eng. Group, Tech. Univ. Darmstadt, Darmstadt, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]},{"raw_affiliation_string":"Security Eng. Group, Tech. Univ. Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034898701","display_name":"Hans Georg Schaathun","orcid":null},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]},{"id":"https://openalex.org/I4210096312","display_name":"\u00c5lesund Hospital","ror":"https://ror.org/00mpvas76","country_code":"NO","type":"healthcare","lineage":["https://openalex.org/I4210096312","https://openalex.org/I4210163832"]}],"countries":["GB","NO"],"is_corresponding":false,"raw_author_name":"Hans Georg Schaathun","raw_affiliation_strings":["Department of Computing, University of Surrey, Guildford, Surrey, UK","Institutt for Teknologiog Nautikkfag, Alesund Univ. Coll., Alesund, Norway"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computing, University of Surrey, Guildford, Surrey, UK","institution_ids":["https://openalex.org/I28290843"]},{"raw_affiliation_string":"Institutt for Teknologiog Nautikkfag, Alesund Univ. Coll., Alesund, Norway","institution_ids":["https://openalex.org/I4210096312"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109154657","display_name":"Mehmet \u00c7elik","orcid":"https://orcid.org/0000-0001-5924-7671"},"institutions":[{"id":"https://openalex.org/I4210166405","display_name":"Technolution (Netherlands)","ror":"https://ror.org/05d021z60","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210166405"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Mehmet U. Celik","raw_affiliation_strings":["Civolution, Eindhoven, Netherlands","Civolution, Eindhoven, The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Civolution, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I4210166405"]},{"raw_affiliation_string":"Civolution, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I4210166405"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013767254"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40854712,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1768","issue":null,"first_page":"41","last_page":"45"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.777131199836731},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6595042943954468},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.6491712331771851},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6286329627037048},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.6006825566291809},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4899231791496277},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.47966793179512024},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4432958662509918},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.44149476289749146},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.43999969959259033},{"id":"https://openalex.org/keywords/false-accusation","display_name":"False accusation","score":0.4253959059715271},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.28567564487457275},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22750741243362427},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15468227863311768},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07899105548858643},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07444560527801514}],"concepts":[{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.777131199836731},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6595042943954468},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.6491712331771851},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6286329627037048},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.6006825566291809},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4899231791496277},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.47966793179512024},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4432958662509918},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.44149476289749146},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.43999969959259033},{"id":"https://openalex.org/C59577422","wikidata":"https://www.wikidata.org/wiki/Q10265143","display_name":"False accusation","level":2,"score":0.4253959059715271},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.28567564487457275},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22750741243362427},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15468227863311768},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07899105548858643},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07444560527801514},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":12,"locations":[{"id":"doi:10.1109/wifs.2009.5386485","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2009.5386485","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 First IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire/cfbebbcf-5abf-4713-8c6c-19bdcf39a7a0","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/cfbebbcf-5abf-4713-8c6c-19bdcf39a7a0","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Skoric, B, Katzenbeisser, S, Schaathun, H G & Celik, M U 2009, Tardos fingerprinting codes in the combined digit model. in Proceedings First IEEE Workshop on Information Forensics and Security (WIFS'09, London, UK, December 6-9, 2009). Institute of Electrical and Electronics Engineers, pp. 41-45. https://doi.org/10.1109/WIFS.2009.5386485","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:667740","is_oa":false,"landing_page_url":"http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=667740","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:804547","is_oa":false,"landing_page_url":"http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=804547","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"External research report"},{"id":"pmh:892891","is_oa":false,"landing_page_url":"http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=892891","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"External research report"},{"id":"pmh:oai:library.tue.nl:667740","is_oa":false,"landing_page_url":"http://repository.tue.nl/667740","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:library.tue.nl:757785","is_oa":false,"landing_page_url":"http://repository.tue.nl/757785","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISSN:1556-6013","raw_type":"Article / Letter to the editor"},{"id":"pmh:oai:library.tue.nl:804547","is_oa":false,"landing_page_url":"http://repository.tue.nl/804547","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"External research report"},{"id":"pmh:oai:library.tue.nl:892891","is_oa":false,"landing_page_url":"http://repository.tue.nl/892891","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"External research report"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/a27645fe-7558-4d86-96b2-35b079972af0","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/a27645fe-7558-4d86-96b2-35b079972af0","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Skoric, B, Katzenbeisser, S, Schaathun, H G & Celik, M U 2009, Tardos fingerprinting codes in the combined digit model. Cryptology ePrint Archive, vol. 2009/244, International Association for Cryptologic Research.","raw_type":"book"},{"id":"pmh:tue:oai:pure.tue.nl:publications/cfbebbcf-5abf-4713-8c6c-19bdcf39a7a0","is_oa":true,"landing_page_url":"https://research.tue.nl/nl/publications/cfbebbcf-5abf-4713-8c6c-19bdcf39a7a0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings First IEEE Workshop on Information Forensics and Security (WIFS'09, London, UK, December 6-9, 2009), 41 - 45","raw_type":"info:eu-repo/semantics/conferencepaper"},{"id":"mag:2953272630","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:openaire/cfbebbcf-5abf-4713-8c6c-19bdcf39a7a0","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/cfbebbcf-5abf-4713-8c6c-19bdcf39a7a0","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Skoric, B, Katzenbeisser, S, Schaathun, H G & Celik, M U 2009, Tardos fingerprinting codes in the combined digit model. in Proceedings First IEEE Workshop on Information Forensics and Security (WIFS'09, London, UK, December 6-9, 2009). Institute of Electrical and Electronics Engineers, pp. 41-45. https://doi.org/10.1109/WIFS.2009.5386485","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1498588281","https://openalex.org/W1505178498","https://openalex.org/W1511872552","https://openalex.org/W1542560898","https://openalex.org/W1966859988","https://openalex.org/W1977832049","https://openalex.org/W2020150968","https://openalex.org/W2068800977","https://openalex.org/W2087879325","https://openalex.org/W2122751269","https://openalex.org/W2131267390","https://openalex.org/W2134195444","https://openalex.org/W2138691165","https://openalex.org/W2145394791","https://openalex.org/W2157531972","https://openalex.org/W4230834613","https://openalex.org/W6630021424"],"related_works":["https://openalex.org/W3142897947","https://openalex.org/W3052285589","https://openalex.org/W1606903272","https://openalex.org/W1535694358","https://openalex.org/W2355198352","https://openalex.org/W2166059096","https://openalex.org/W2950152419","https://openalex.org/W3098847492","https://openalex.org/W3196459517","https://openalex.org/W2742651484","https://openalex.org/W2255466788","https://openalex.org/W2148775847","https://openalex.org/W2045190631","https://openalex.org/W2564657638","https://openalex.org/W2041852062","https://openalex.org/W2514983544","https://openalex.org/W2552044775","https://openalex.org/W2094870873","https://openalex.org/W2097499124","https://openalex.org/W2070442620"],"abstract_inverted_index":{"We":[0],"introduce":[1],"a":[2,58],"new":[3,50],"attack":[4],"model":[5,51],"for":[6,69],"collusion-secure":[7],"codes,":[8],"called":[9],"the":[10,20,33,39,49,67,70],"combined":[11],"digit":[12,74],"model,":[13],"which":[14],"represents":[15],"signal":[16],"processing":[17],"attacks":[18,55],"against":[19],"underlying":[21],"watermarking":[22],"level":[23],"better":[24],"than":[25],"existing":[26],"models.":[27],"In":[28],"this":[29],"paper,":[30],"we":[31],"analyze":[32],"performance":[34],"of":[35,38],"two":[36],"variants":[37,46],"Tardos":[40],"code":[41,62],"and":[42,52],"show":[43],"that":[44],"both":[45],"can":[47],"accommodate":[48],"resist":[53],"collusion":[54],"with":[56],"only":[57],"modest":[59],"increase":[60],"in":[61],"length":[63],"as":[64],"compared":[65],"to":[66],"results":[68],"commonly":[71],"used":[72],"restricted":[73],"model.":[75]},"counts_by_year":[],"updated_date":"2026-04-27T08:22:11.395708","created_date":"2025-10-10T00:00:00"}
