A combinatorial approach to asymmetric traitor tracing

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To protect against illegal copying and distribution of digital objects, such as images, videos and software products, merchants can ‘fingerprint’ objects by embedding a distinct codeword in each copy of the object, hence allowing unique identication of the buyer. The buyer does not know where the codeword is embedded and so cannot tamper with it. However a group of dishonest buyers can compare their copies of the object, nd some of the embedded bits and change them to create a pirate copy. A c-traceability scheme can identify at least one of the colluders if up to c colluders have generated a pirate copy. In this paper we assume the merchant is not trusted and may attempt to ‘frame’ a buyer by embedding the buyer’s codeword in a second copy of the object. We introduce a third party called the ‘arbiter’ who is trusted and can arbitrate between the buyer and the merchant if a dispute occurs. We describe the system as a set system and give two constructions, one based on polynomials over nite elds and the other based on or-thogonal arrays, that provide protection in the above scenario.

Cite

CITATION STYLE

APA

Safavi-Naini, R., & Wang, Y. (2000). A combinatorial approach to asymmetric traitor tracing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1858, pp. 416–425). Springer Verlag. https://doi.org/10.1007/3-540-44968-x_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free