This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread
September/October 2010 (vol. 8 no. 5)
pp. 69-71
Teddy Furon, INRIA
Gwenaël Doërr, Technicolor R&D France
Traitor tracing aims to pinpoint the origin of a leak in a distribution framework. It offers a promising way to navigate the complex maze of Internet content piracy.

1. H. Jin, J. Lotspiech, and S. Nusser, "Traitor Tracing for Prerecorded and Recordable Media," Proc. 4th ACM Workshop Digital Rights Management, ACM Press, 2004, pp. 83–90.
2. I.J. Cox et al., Digital Watermarking and Steganography, 2nd ed., Morgan Kaufmann, 2008.
3. B. Chor et al., "Tracing Traitors," IEEE Trans. Information Theory, vol. 46, no. 3, 2000, pp. 893–910.
4. D. Boneh and J. Shaw, "Collusion-Secure Fingerprinting for Digital Data," IEEE Trans. Information Theory, vol. 44, no. 5, 1998, pp. 1897–1905.
5. G. Tardos, "Optimal Probabilistic Fingerprint Codes," Proc. 35th Ann. ACM Symp. Theory of Computing, ACM Press, 2003, pp. 116–125.
6. B. Skoric et al., "Tardos Fingerprinting Is Better Than We Thought," IEEE Trans. Information Theory, vol. 54, no. 8, 2008, pp. 3663–3676.

Index Terms:
digital rights management, content fingerprinting, traitor tracing, content piracy, digital watermarking, anticollusion codes, Gabor Tardos, Internet, multimedia, security and privacy
Citation:
Teddy Furon, Gwenaël Doërr, "Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread," IEEE Security & Privacy, vol. 8, no. 5, pp. 69-71, Sept.-Oct. 2010, doi:10.1109/MSP.2010.167
Usage of this product signifies your acceptance of the Terms of Use.