EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION
Hongxia Jin
2009
Abstract
In this paper we study the traitor tracing problem in the context of content protection. Traitor tracing is a forensic technology that attempts to detect the users who have involved in the pirate attacks when pirate evidences are recovered. There are different types of pirate attacks and each requires a different traitor tracing mechanism. We studied different types of attacks, surveyed various traitor tracing schemes and analyzed spectrum of traceabilities of different schemes using two representative schemes. We shall present some observations on the designs and their impact on the efficiency of the schemes. We shall also present various future directions that can lead to simpler and more efficient traitor tracing schemes for various pirate attacks.
DownloadPaper Citation
in Harvard Style
Jin H. (2009). EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 270-273. DOI: 10.5220/0002235002700273
in Bibtex Style
@conference{secrypt09,
author={Hongxia Jin},
title={EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={270-273},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002235002700273},
isbn={978-989-674-005-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION
SN - 978-989-674-005-4
AU - Jin H.
PY - 2009
SP - 270
EP - 273
DO - 10.5220/0002235002700273