{"id":201431,"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00201431","sets":["6164:6165:6462:10022"]},"path":["10022"],"owner":"44499","recid":"201431","title":["電子指紋符号の結託攻撃パラメータ推定のための特徴ベクトル導出及びその次元削減"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-10-14"},"_buckets":{"deposit":"f9255999-cc20-40f0-80cc-ca042e4079a7"},"_deposit":{"id":"201431","pid":{"type":"depid","value":"201431","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"電子指紋符号の結託攻撃パラメータ推定のための特徴ベクトル導出及びその次元削減","author_link":["492567","492572","492571","492570","492568","492569"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"電子指紋符号の結託攻撃パラメータ推定のための特徴ベクトル導出及びその次元削減"},{"subitem_title":"Extraction of Characteristic Vectors and Its Dimension Reduction for Estimating Collusion Strategy in Fingerprinting Codes","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"電子指紋符号,最適な検出器,結託攻撃戦略,結託者数,推定器","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2019-10-14","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"岡山大学大学院自然科学研究科"},{"subitem_text_value":"岡山大学大学院自然科学研究科"},{"subitem_text_value":"岡山大学大学院自然科学研究科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Natural Science and Technology, Okayama University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Natural Science and Technology, Okayama University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Natural Science and Technology, Okayama University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/201431/files/IPSJCSS2019138.pdf","label":"IPSJCSS2019138.pdf"},"date":[{"dateType":"Available","dateValue":"2021-10-14"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2019138.pdf","filesize":[{"value":"470.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"006f9087-ce30-4321-b6ce-ee09fb06dd43","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"安井, 達哉"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"栗林, 稔"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"舩曵, 信生"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tatsuya, Yasui","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Minoru, Kuribayashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Nobuo, Funabiki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"電子指紋符号に対して結託攻撃を行った結託者を検出する最適な検出器が提案されている.しかし,この検出器では,結託攻撃戦略と結託者数の情報が必要となる.従来研究では,符号語のシンボルの偏りに注目することでパラメータを高精度で推定し,最適な検出器に近い性能を達成している.一方で,複数の結託者を検出するために符号語生成用パラメータの値が増加した場合,この推定器では推定のためのベクトル空間の次元が増加することが考えられる.本研究では,推定に必要な特徴ベクトルのドミナントな成分に着目し,ベクトル空間の次元の増加に依存せず一定の次元で推定が行えるように,推定のための高次元ベクトル空間の次元削減法を提案する.また,従来研究で考慮されていなかった,異なる符号語生成パラメータでの推定器を実装し,計算機シミュレーションによって検出性能の比較を行った.計算機シミュレーションの結果,次元削減を行った状態でも高い性能を達成し,最適な検出器に近い性能を有することが確認できた.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The optimal detector against colluders in fingerprinting codes has been proposed.However, this detector requires information about the collusion attack strategy and the number of colluders.In the previous studies, the estimator using the bias of symbols of codewords made it possible to estimate these parameters with high accuracy and the performance of detection almost achieved the optimal detector.On the other hand, assuming multiple colluders attack and the parameter for generation of codewords is increased, it may be necessary to reduce dimensions for estimation because it depends on the parameters for generation.This study shows a detector for large colluders using low dimension estimator which uses dominant features and the computational simulation compared with previous studies.As a result of simulation, it reveal that our proposed detector reached the optimal detector and previous estimator without a large scale dimension.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"989","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2019論文集"}],"bibliographicPageStart":"982","bibliographicIssueDates":{"bibliographicIssueDate":"2019-10-14","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2019"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T21:02:21.167582+00:00","created":"2025-01-19T01:04:41.940800+00:00","links":{}}