Flexible Traitor Tracing for Anonymous Attacks
Copyrighted materials are divided into multiple segments and each segment has multiple variations that are differently watermarked and encrypted. The combination of watermark and encryption enables one to identify the actual users (traitors) who have engaged in the piracy. In this paper, we shall present a traitor tracing scheme that can efficiently and flexibly defend against anonymous attacks.
KeywordsMultiple Segment Outer Code Solomon Code Content Protection Unauthorized Copy
- 1.Jin, H., Lotspiech, J., Nusser, S.: Traitor tracing for prerecorded and recordable media. In: ACM DRM workshop (October 2004)Google Scholar