Identification algorithms for sequential traitor tracing

0Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Sequential traitor tracing schemes [10, 11] are generally used to deter piracy in multimedia content delivery scenarios. This is accomplished by embedding the codewords of a code with traceability properties into the content, prior to its delivery. The focus of this paper is on tracing algorithms for sequential traitor tracing schemes, where soft-decision list decoding techniques are applied in order to improve the identification process in the original sequential traitor tracing schemes, where where a brute force approach is used. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Fernandez, M., & Soriano, M. (2004). Identification algorithms for sequential traitor tracing. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3348, 414–429. https://doi.org/10.1007/978-3-540-30556-9_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free