Copyrighted materials are divided into multiple segments and each segment has multiple variations that are differently water-marked and encrypted. The combination of watermark and encryption enables one to identify the actual users (traitors) who have engaged in the piracy. In this paper, we shall present a traitor tracing scheme that can efficiently and flexibly defend against anonymous attacks. © IFIP International Federation for Information Processing 2005.
CITATION STYLE
Jin, H., & Lotspiech, J. (2005). Flexible traitor tracing for anonymous attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3677 LNCS, pp. 269–270). https://doi.org/10.1007/11552055_29
Mendeley helps you to discover research relevant for your work.