Abstract
Separable code (SC, Cheng and Miao IEEE Trans. Inf. Theory 57, 4843–4851, 2011), frameproof code (FPC, Boneh and Shaw IEEE Trans. Inf. Theory 44, 1897–1905, 1998) and strongly separable code (SSC, Jiang et al. Des. Codes Cryptogr. 79:303–318, 2016) are used to construct anti-collusion codes. SSC is better than FPC and SC in the applications for multimedia fingerprinting since SSC has lower identifying complexity than that of SC (the same complexity as FPC) and weaker structure than that of FPC. In this paper, we first derive several upper bounds on the number of codewords of a \(\overline {t}\)-SSC. Then we focus on \(\overline {3}\)-SSCs with codeword length 3 and obtain the following two main results: (1) An equivalence between an SSC and an SC is derived; (2) An improved lower bound Ω(q 5/3 + q 4/3 − q) on the size of a q-ary SSC when \(q={q_{1}^{6}}\) for any prime power q 1 ≡ 1 (mod 6), which is better than the previously known bound \(\lfloor \sqrt {q}\rfloor ^{3}\), is obtained by means of a difference matrix and a known result on the subsets of \(\mathbb {F}^{n}_{q}\) containing no three points on a line.
Similar content being viewed by others
References
Alon, N., Fischer, E., Szegedy, M.: Parent-identifying codes. J. Combin. Theory Ser. A 95, 349–359 (2001)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Tran. Inf. Theory 44, 1897–1905 (1998)
Bose, R.C., Bush, K.A.: Orthogonal arrays of strength two and three. Ann. Math. Statist. 23, 508–524 (1952)
Bierbrauer, J.: Large caps. J. Geom. 76, 16–51 (2003)
Blackburn, S.R.: Frameproof codes. SIAM J. Discrete Math. 16, 499–510 (2003)
Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47, 1423–1443 (2001)
Cheng, M., Fu, H.-L., Jiang, J., Lo, Y.-H., Miao, Y.: New bounds on \(\overline {2}\)-separable codes of length 2. Des. Codes Cryptogr. 74, 31–40 (2015)
Cheng, M., Ji, L., Miao, Y.: Separable codes. IEEE Trans. Inf. Theory 58, 1791–1803 (2012)
Cheng, M., Jiang, J., Li, H., Miao, Y., Tang, X.: Bounds and construction for \(\overline {3}\)-separable codes with short length 3. Des. Codes Cryptogr. doi:10.1007/s10623-015-0160-9
Cheng, M., Jiang, J., Tang, X.: Asymptotically optimal \(\overline {2}\)-separable codes with length 4. Cryptogr. Commun. doi:10.1007/s12095-016-0182-9
Cheng, M., Miao, Y.: On anti-collusion codes and detection algorithms for multimedia fingerprinting. IEEE Trans. Inf. Theory 57, 4843–4851 (2011)
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673–1687 (1997)
Drake, D.A: Partial λ-geometries and generalized Hadamard matrices over groups. Canad. J. Math. 31, 617–627 (1979)
Gao, F., Ge, G.: New bounds on separable codes for multimedia fingerprinting. IEEE Trans. Inf. Theory 60, 5257–5262 (2014)
Jiang, J., Cheng, M., Miao, Y.: Strongly separable codes. Des. Codes Cryptogr. 79, 303–318 (2016)
Lin, Y., Wolf, J.: On subset of \(\mathbb {F}^{n}_{q}\) containing no k-term progressions. Eur. J. Comb. 31, 1398–1403 (2010)
Liu, K.J.R., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi, New York (2005)
Moulin, P., O’Sullivan J.A.: Information-theoretic analysis of information hiding. IEEE Trans. Inf. Theory 49, 563–593 (2003)
Podilchuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE J. Select. Areas Commun. 16, 525–539 (1998)
Shangguan, C., Ge, G.: Separating hash families: a Johnson-type bound and new constructions. SIAM J. Discrete. Math. 30, 2243–2264 (2016)
Szemerédi, E.: On sets of integers containing no k elements in arithmetic progression. Acta Arith. 27, 199–245 (1975)
Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 51, 1069–1087 (2003)
Acknowledgements
The authors express their sincere thanks to the two anonymous reviewers for their critical comments and suggestions which made this paper significantly improved, and to the editor for his/her excellent editorial job. This work is in part supported by NSFC (No.11301098, 11601096 and 61672176), 2016GXNSF(No. FA380009 and CA380021), 2014GXNSFDA118001, Guangxi Higher Institutions’ Program of Introducing 100 High-Level Overseas Talents, Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing, and Guangxi Bagui Scholar Teams for Innovation and Research.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, X., Jiang, J. & Cheng, M. Bounds and constructions for \(\overline {3}\)-strongly separable codes with length 3. Cryptogr. Commun. 10, 555–565 (2018). https://doi.org/10.1007/s12095-017-0235-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-017-0235-8
Keywords
- Multimedia fingerprinting
- Separable code
- Strongly separable code
- Forbidden configuration
- Difference matrix