[BOK][B] Concise encyclopedia of coding theory

WC Huffman, JL Kim, P Solé - 2021 - api.taylorfrancis.com
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …

[BOK][B] Algebraic geometry in coding theory and cryptography

H Niederreiter, C **ng - 2009 - books.google.com
This textbook equips graduate students and advanced undergraduates with the necessary
theoretical tools for applying algebraic geometry to information theory, and it covers primary …

On anti-collusion codes and detection algorithms for multimedia fingerprinting

M Cheng, Y Miao - IEEE transactions on information theory, 2011 - ieeexplore.ieee.org
Multimedia fingerprinting is an effective technique to trace the sources of pirate copies of
copyrighted multimedia information. AND anti-collusion codes can be used to construct …

Towards a privacy protection-capable noise fingerprinting for numerically aggregated data

Y Hu, A Hu, C Li, P Li, C Zhang - Computers & Security, 2022 - Elsevier
Privacy protection and traitor tracing have always been two separate research subjects.
Meanwhile, digital fingerprinting, which tracks illegally distributed digital media by creating a …

Signature codes for weighted binary adder channel and multimedia fingerprinting

J Fan, Y Gu, M Hachimori, Y Miao - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we study binary signature codes for the weighted binary adder channel
(WbAC) and collusion-resistant multimedia fingerprinting. Let A (n, t) denote the maximum …

On generalized separating hash families

DR Stinson, R Wei, K Chen - Journal of Combinatorial Theory, Series A, 2008 - Elsevier
On generalized separating hash families Page 1 Journal of Combinatorial Theory, Series A 115
(2008) 105–120 www.elsevier.com/locate/jcta On generalized separating hash families DR …

Algebraic geometry codes and some applications

A Couvreur… - Concise encyclopedia of …, 2021 - api.taylorfrancis.com
Concise Encyclopedia of Coding Theory Page 1 Chapter 15 Algebraic Geometry Codes
and Some Applications Alain Couvreur Inria and LIX, Ecole Polytechnique Hugues …

Separable codes

M Cheng, L Ji, Y Miao - IEEE transactions on information theory, 2011 - ieeexplore.ieee.org
Multimedia fingerprinting is an effective technique to trace the sources of pirate copies of
copyrighted multimedia information. Separable codes can be used to construct fingerprints …

Torsion limits and Riemann-Roch systems for function fields and applications

I Cascudo, R Cramer, C **ng - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The Ihara limit (or constant) has been a central problem of study in the asymptotic theory of
global function fields (or equivalently, algebraic curves over finite fields). It addresses global …

Probabilistic existence results for separable codes

SR Blackburn - IEEE Transactions on Information Theory, 2015 - ieeexplore.ieee.org
Separable codes were defined by Cheng and Miao in 2011, motivated by applications to the
identification of pirates in a multimedia setting. Combinatorially, t̅-separable codes lie …