This Article 
 Bibliographic References 
 Add to: 
Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread
September/October 2010 (vol. 8 no. 5)
pp. 69-71
Teddy Furon, INRIA
Gwenaël Doërr, Technicolor R&D France
Traitor tracing aims to pinpoint the origin of a leak in a distribution framework. It offers a promising way to navigate the complex maze of Internet content piracy.

1. H. Jin, J. Lotspiech, and S. Nusser, "Traitor Tracing for Prerecorded and Recordable Media," Proc. 4th ACM Workshop Digital Rights Management, ACM Press, 2004, pp. 83–90.
2. I.J. Cox et al., Digital Watermarking and Steganography, 2nd ed., Morgan Kaufmann, 2008.
3. B. Chor et al., "Tracing Traitors," IEEE Trans. Information Theory, vol. 46, no. 3, 2000, pp. 893–910.
4. D. Boneh and J. Shaw, "Collusion-Secure Fingerprinting for Digital Data," IEEE Trans. Information Theory, vol. 44, no. 5, 1998, pp. 1897–1905.
5. G. Tardos, "Optimal Probabilistic Fingerprint Codes," Proc. 35th Ann. ACM Symp. Theory of Computing, ACM Press, 2003, pp. 116–125.
6. B. Skoric et al., "Tardos Fingerprinting Is Better Than We Thought," IEEE Trans. Information Theory, vol. 54, no. 8, 2008, pp. 3663–3676.

Index Terms:
digital rights management, content fingerprinting, traitor tracing, content piracy, digital watermarking, anticollusion codes, Gabor Tardos, Internet, multimedia, security and privacy
Teddy Furon, Gwenaël Doërr, "Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread," IEEE Security & Privacy, vol. 8, no. 5, pp. 69-71, Sept.-Oct. 2010, doi:10.1109/MSP.2010.167
Usage of this product signifies your acceptance of the Terms of Use.