The Community for Technology Leaders
RSS Icon
Issue No.05 - September/October (2010 vol.8)
pp: 69-71
Teddy Furon , INRIA
Gwenaël Doërr , Technicolor R&D France
Traitor tracing aims to pinpoint the origin of a leak in a distribution framework. It offers a promising way to navigate the complex maze of Internet content piracy.
digital rights management, content fingerprinting, traitor tracing, content piracy, digital watermarking, anticollusion codes, Gabor Tardos, Internet, multimedia, security and privacy
Teddy Furon, Gwenaël Doërr, "Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread", IEEE Security & Privacy, vol.8, no. 5, pp. 69-71, September/October 2010, doi:10.1109/MSP.2010.167
1. H. Jin, J. Lotspiech, and S. Nusser, "Traitor Tracing for Prerecorded and Recordable Media," Proc. 4th ACM Workshop Digital Rights Management, ACM Press, 2004, pp. 83–90.
2. I.J. Cox et al., Digital Watermarking and Steganography, 2nd ed., Morgan Kaufmann, 2008.
3. B. Chor et al., "Tracing Traitors," IEEE Trans. Information Theory, vol. 46, no. 3, 2000, pp. 893–910.
4. D. Boneh and J. Shaw, "Collusion-Secure Fingerprinting for Digital Data," IEEE Trans. Information Theory, vol. 44, no. 5, 1998, pp. 1897–1905.
5. G. Tardos, "Optimal Probabilistic Fingerprint Codes," Proc. 35th Ann. ACM Symp. Theory of Computing, ACM Press, 2003, pp. 116–125.
6. B. Skoric et al., "Tardos Fingerprinting Is Better Than We Thought," IEEE Trans. Information Theory, vol. 54, no. 8, 2008, pp. 3663–3676.
26 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool