Proceedings of the 4th ACM Workshop on Digital Rights Management 2004
DOI: 10.1145/1029146.1029160
|View full text |Cite
|
Sign up to set email alerts
|

Traitor tracing for prerecorded and recordable media

Abstract: In this paper we are focusing on the use of a traitor tracing scheme for distribution models that are based on prerecorded or recordable physical media. When a pirated copy of the protected content is observed, the traitor tracing scheme allows the identification of at least one of the real subscribers who participated in the construction of the pirated copy. We show how we systematically assign the variations to users.We explore under what circumstances traitor tracing technology is applicable for media based… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
33
0

Year Published

2005
2005
2011
2011

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 35 publications
(33 citation statements)
references
References 12 publications
0
33
0
Order By: Relevance
“…AACS adopts the use of the scheme in [20] as the assignment step to satisfy some practical restrictions for the assignment step. But the detection step shown in [20] is not efficient and practical enough.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…AACS adopts the use of the scheme in [20] as the assignment step to satisfy some practical restrictions for the assignment step. But the detection step shown in [20] is not efficient and practical enough.…”
Section: Introductionmentioning
confidence: 99%
“…AACS adopts the use of the scheme in [20] as the assignment step to satisfy some practical restrictions for the assignment step. But the detection step shown in [20] is not efficient and practical enough. The algorithm we will show in this paper takes into considerations of those realities shown above that have largely been overlooked in existing work.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Because some users (called traitors) may give out their decryption keys to construct pirate decoders, and some users (also called traitors) may directly spread the decrypted contents over the Internet (known as anonymous attack [15] or pirate rebroadcast [17]), the ability of traitor tracing is needed for broadcast encryption system. Traitor tracing scheme is used to discourage legitimate subscribers from giving away their secret keys and decrypted contents.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, we concatenate codes [1]. In our construction, variations in each segment are assigned following an inner code, which are then encoded using an outer code.…”
Section: Introductionmentioning
confidence: 99%