Fingerprinting for broadcast content distribution system

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The objective of traitor tracing technique is to enable a broadcaster to identify illegal users from secret keys issued to them. In a broadcast encryption scheme, although a broadcaster can identify a traitor when a secret key is leaked, the decrypted copy is not protected from illegal distribution. In the fingerprinting scheme, a broadcaster can trace illegal users from a pirated copy because each user purchases the copy watermarked by his own fingerprint. However, the transaction to distribute the copy is one-to-one. In this paper, we have proposed a broadcast-type fingerprinting scheme such that only authorized users who have own decryption key can obtain the fingerprinted copy.

Original languageEnglish
Title of host publicationDigital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Revised Selected Papers
PublisherSpringer Verlag
Pages163-175
Number of pages13
Volume9569
ISBN (Print)9783319319599
DOIs
Publication statusPublished - 2016
Event14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015 - Tokyo, Japan
Duration: Oct 7 2015Oct 10 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9569
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015
CountryJapan
CityTokyo
Period10/7/1510/10/15

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'Fingerprinting for broadcast content distribution system'. Together they form a unique fingerprint.

Cite this