Sciweavers

137 search results - page 9 / 28
» Hybrid Traitor Tracing
Sort
View
ICIP
2007
IEEE
15 years 11 months ago
Multi-User Collusion Behavior Forensics: Game Theoretic Formulation of Fairness Dynamics
Multi-user collusion is an cost-effective attack against digital fingerprinting, in which a group of attackers collectively undermine the traitor tracing capability of digital fin...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ICIP
2006
IEEE
15 years 11 months ago
Scalable Multimedia Fingerprinting Forensics with Side Information
Digital fingerprinting uniquely labels each distributed copy with user's ID and provides a proactive means to track the distribution of multimedia. Multi-user collusion is a ...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ICC
2007
IEEE
15 years 3 months ago
Security Flaws in Kuribayashi-Tanaka Fingerprinting Protocol
— The buyer-seller watermarking protocol enables a seller to successfully identify at least one traitor from a pirated copy, while prevent the seller from framing an innocent buy...
Yongdong Wu
JUCS
2010
155views more  JUCS 2010»
14 years 4 months ago
Watermarking Techniques for Relational Databases: Survey, Classification and Comparison
Abstract: Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of...
Raju Halder, Shantanu Pal, Agostino Cortesi
ASIACRYPT
2003
Springer
15 years 2 months ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert