Fingerprinting for broadcast content distribution system

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The objective of traitor tracing technique is to enable a broadcaster to identify illegal users from secret keys issued to them. In a broadcast encryption scheme, although a broadcaster can identify a traitor when a secret key is leaked, the decrypted copy is not protected from illegal distribution. In the fingerprinting scheme, a broadcaster can trace illegal users from a pirated copy because each user purchases the copy watermarked by his own fingerprint. However, the transaction to distribute the copy is one-to-one. In this paper, we have proposed a broadcast-type fingerprinting scheme such that only authorized users who have own decryption key can obtain the fingerprinted copy.

Original languageEnglish
Title of host publicationDigital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Revised Selected Papers
PublisherSpringer Verlag
Pages163-175
Number of pages13
Volume9569
ISBN (Print)9783319319599
DOIs
Publication statusPublished - 2016
Event14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015 - Tokyo, Japan
Duration: Oct 7 2015Oct 10 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9569
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015
CountryJapan
CityTokyo
Period10/7/1510/10/15

Fingerprint

Content Distribution
Fingerprinting
Distribution System
Broadcast
Cryptography
Traitor Tracing
Broadcast Encryption
Fingerprint
Transactions
Trace

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Kuribayashi, M. (2016). Fingerprinting for broadcast content distribution system. In Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Revised Selected Papers (Vol. 9569, pp. 163-175). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9569). Springer Verlag. https://doi.org/10.1007/978-3-319-31960-5_14

Fingerprinting for broadcast content distribution system. / Kuribayashi, Minoru.

Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Revised Selected Papers. Vol. 9569 Springer Verlag, 2016. p. 163-175 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9569).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kuribayashi, M 2016, Fingerprinting for broadcast content distribution system. in Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Revised Selected Papers. vol. 9569, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9569, Springer Verlag, pp. 163-175, 14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015, Tokyo, Japan, 10/7/15. https://doi.org/10.1007/978-3-319-31960-5_14
Kuribayashi M. Fingerprinting for broadcast content distribution system. In Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Revised Selected Papers. Vol. 9569. Springer Verlag. 2016. p. 163-175. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-31960-5_14
Kuribayashi, Minoru. / Fingerprinting for broadcast content distribution system. Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Revised Selected Papers. Vol. 9569 Springer Verlag, 2016. pp. 163-175 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{4561031fad984b76beab7900033a7f11,
title = "Fingerprinting for broadcast content distribution system",
abstract = "The objective of traitor tracing technique is to enable a broadcaster to identify illegal users from secret keys issued to them. In a broadcast encryption scheme, although a broadcaster can identify a traitor when a secret key is leaked, the decrypted copy is not protected from illegal distribution. In the fingerprinting scheme, a broadcaster can trace illegal users from a pirated copy because each user purchases the copy watermarked by his own fingerprint. However, the transaction to distribute the copy is one-to-one. In this paper, we have proposed a broadcast-type fingerprinting scheme such that only authorized users who have own decryption key can obtain the fingerprinted copy.",
author = "Minoru Kuribayashi",
year = "2016",
doi = "10.1007/978-3-319-31960-5_14",
language = "English",
isbn = "9783319319599",
volume = "9569",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "163--175",
booktitle = "Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Revised Selected Papers",

}

TY - GEN

T1 - Fingerprinting for broadcast content distribution system

AU - Kuribayashi, Minoru

PY - 2016

Y1 - 2016

N2 - The objective of traitor tracing technique is to enable a broadcaster to identify illegal users from secret keys issued to them. In a broadcast encryption scheme, although a broadcaster can identify a traitor when a secret key is leaked, the decrypted copy is not protected from illegal distribution. In the fingerprinting scheme, a broadcaster can trace illegal users from a pirated copy because each user purchases the copy watermarked by his own fingerprint. However, the transaction to distribute the copy is one-to-one. In this paper, we have proposed a broadcast-type fingerprinting scheme such that only authorized users who have own decryption key can obtain the fingerprinted copy.

AB - The objective of traitor tracing technique is to enable a broadcaster to identify illegal users from secret keys issued to them. In a broadcast encryption scheme, although a broadcaster can identify a traitor when a secret key is leaked, the decrypted copy is not protected from illegal distribution. In the fingerprinting scheme, a broadcaster can trace illegal users from a pirated copy because each user purchases the copy watermarked by his own fingerprint. However, the transaction to distribute the copy is one-to-one. In this paper, we have proposed a broadcast-type fingerprinting scheme such that only authorized users who have own decryption key can obtain the fingerprinted copy.

UR - http://www.scopus.com/inward/record.url?scp=84964052768&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84964052768&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-31960-5_14

DO - 10.1007/978-3-319-31960-5_14

M3 - Conference contribution

SN - 9783319319599

VL - 9569

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 163

EP - 175

BT - Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Revised Selected Papers

PB - Springer Verlag

ER -