Sequential traitor tracing schemes [10, 11] are generally used to deter piracy in multimedia content delivery scenarios. This is accomplished by embedding the codewords of a code with traceability properties into the content, prior to its delivery. The focus of this paper is on tracing algorithms for sequential traitor tracing schemes, where soft-decision list decoding techniques are applied in order to improve the identification process in the original sequential traitor tracing schemes, where where a brute force approach is used. © Springer-Verlag 2004.
CITATION STYLE
Fernandez, M., & Soriano, M. (2004). Identification algorithms for sequential traitor tracing. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3348, 414–429. https://doi.org/10.1007/978-3-540-30556-9_32
Mendeley helps you to discover research relevant for your work.