Skip to main content
Log in

Bounds and constructions for \(\overline {3}\)-strongly separable codes with length 3

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

Separable code (SC, Cheng and Miao IEEE Trans. Inf. Theory 57, 4843–4851, 2011), frameproof code (FPC, Boneh and Shaw IEEE Trans. Inf. Theory 44, 1897–1905, 1998) and strongly separable code (SSC, Jiang et al. Des. Codes Cryptogr. 79:303–318, 2016) are used to construct anti-collusion codes. SSC is better than FPC and SC in the applications for multimedia fingerprinting since SSC has lower identifying complexity than that of SC (the same complexity as FPC) and weaker structure than that of FPC. In this paper, we first derive several upper bounds on the number of codewords of a \(\overline {t}\)-SSC. Then we focus on \(\overline {3}\)-SSCs with codeword length 3 and obtain the following two main results: (1) An equivalence between an SSC and an SC is derived; (2) An improved lower bound Ω(q 5/3 + q 4/3q) on the size of a q-ary SSC when \(q={q_{1}^{6}}\) for any prime power q 1 ≡ 1 (mod 6), which is better than the previously known bound \(\lfloor \sqrt {q}\rfloor ^{3}\), is obtained by means of a difference matrix and a known result on the subsets of \(\mathbb {F}^{n}_{q}\) containing no three points on a line.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Alon, N., Fischer, E., Szegedy, M.: Parent-identifying codes. J. Combin. Theory Ser. A 95, 349–359 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  2. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Tran. Inf. Theory 44, 1897–1905 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  3. Bose, R.C., Bush, K.A.: Orthogonal arrays of strength two and three. Ann. Math. Statist. 23, 508–524 (1952)

    Article  MathSciNet  MATH  Google Scholar 

  4. Bierbrauer, J.: Large caps. J. Geom. 76, 16–51 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  5. Blackburn, S.R.: Frameproof codes. SIAM J. Discrete Math. 16, 499–510 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  6. Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47, 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  7. Cheng, M., Fu, H.-L., Jiang, J., Lo, Y.-H., Miao, Y.: New bounds on \(\overline {2}\)-separable codes of length 2. Des. Codes Cryptogr. 74, 31–40 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  8. Cheng, M., Ji, L., Miao, Y.: Separable codes. IEEE Trans. Inf. Theory 58, 1791–1803 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  9. Cheng, M., Jiang, J., Li, H., Miao, Y., Tang, X.: Bounds and construction for \(\overline {3}\)-separable codes with short length 3. Des. Codes Cryptogr. doi:10.1007/s10623-015-0160-9

  10. Cheng, M., Jiang, J., Tang, X.: Asymptotically optimal \(\overline {2}\)-separable codes with length 4. Cryptogr. Commun. doi:10.1007/s12095-016-0182-9

  11. Cheng, M., Miao, Y.: On anti-collusion codes and detection algorithms for multimedia fingerprinting. IEEE Trans. Inf. Theory 57, 4843–4851 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  12. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673–1687 (1997)

    Article  Google Scholar 

  13. Drake, D.A: Partial λ-geometries and generalized Hadamard matrices over groups. Canad. J. Math. 31, 617–627 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  14. Gao, F., Ge, G.: New bounds on separable codes for multimedia fingerprinting. IEEE Trans. Inf. Theory 60, 5257–5262 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  15. Jiang, J., Cheng, M., Miao, Y.: Strongly separable codes. Des. Codes Cryptogr. 79, 303–318 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  16. Lin, Y., Wolf, J.: On subset of \(\mathbb {F}^{n}_{q}\) containing no k-term progressions. Eur. J. Comb. 31, 1398–1403 (2010)

    Article  Google Scholar 

  17. Liu, K.J.R., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi, New York (2005)

    Book  Google Scholar 

  18. Moulin, P., O’Sullivan J.A.: Information-theoretic analysis of information hiding. IEEE Trans. Inf. Theory 49, 563–593 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  19. Podilchuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE J. Select. Areas Commun. 16, 525–539 (1998)

    Article  Google Scholar 

  20. Shangguan, C., Ge, G.: Separating hash families: a Johnson-type bound and new constructions. SIAM J. Discrete. Math. 30, 2243–2264 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  21. Szemerédi, E.: On sets of integers containing no k elements in arithmetic progression. Acta Arith. 27, 199–245 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  22. Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 51, 1069–1087 (2003)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

The authors express their sincere thanks to the two anonymous reviewers for their critical comments and suggestions which made this paper significantly improved, and to the editor for his/her excellent editorial job. This work is in part supported by NSFC (No.11301098, 11601096 and 61672176), 2016GXNSF(No. FA380009 and CA380021), 2014GXNSFDA118001, Guangxi Higher Institutions’ Program of Introducing 100 High-Level Overseas Talents, Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing, and Guangxi Bagui Scholar Teams for Innovation and Research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Minquan Cheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, X., Jiang, J. & Cheng, M. Bounds and constructions for \(\overline {3}\)-strongly separable codes with length 3. Cryptogr. Commun. 10, 555–565 (2018). https://doi.org/10.1007/s12095-017-0235-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-017-0235-8

Keywords

Mathematics Subject Classification (2010)

Navigation