Flexible Traitor Tracing for Anonymous Attacks

  • Hongxia Jin
  • Jeffery Lotspiech
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3677)


Copyrighted materials are divided into multiple segments and each segment has multiple variations that are differently watermarked and encrypted. The combination of watermark and encryption enables one to identify the actual users (traitors) who have engaged in the piracy. In this paper, we shall present a traitor tracing scheme that can efficiently and flexibly defend against anonymous attacks.


Multiple Segment Outer Code Solomon Code Content Protection Unauthorized Copy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Jin, H., Lotspiech, J., Nusser, S.: Traitor tracing for prerecorded and recordable media. In: ACM DRM workshop (October 2004)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2005

Authors and Affiliations

  • Hongxia Jin
    • 1
  • Jeffery Lotspiech
    • 1
  1. 1.IBM Almaden Research CenterSan JoseUSA

Personalised recommendations