Sciweavers

62 search results - page 10 / 13
» Trade-Off Traitor Tracing
Sort
View
CCS
2006
ACM
14 years 2 months ago
A fully collusion resistant broadcast, trace, and revoke system
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke systems...
Dan Boneh, Brent Waters
ICIP
2007
IEEE
15 years 17 days ago
Multi-User Collusion Behavior Forensics: Game Theoretic Formulation of Fairness Dynamics
Multi-user collusion is an cost-effective attack against digital fingerprinting, in which a group of attackers collectively undermine the traitor tracing capability of digital fin...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ICIP
2006
IEEE
15 years 16 days ago
Scalable Multimedia Fingerprinting Forensics with Side Information
Digital fingerprinting uniquely labels each distributed copy with user's ID and provides a proactive means to track the distribution of multimedia. Multi-user collusion is a ...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ICC
2007
IEEE
14 years 5 months ago
Security Flaws in Kuribayashi-Tanaka Fingerprinting Protocol
— The buyer-seller watermarking protocol enables a seller to successfully identify at least one traitor from a pirated copy, while prevent the seller from framing an innocent buy...
Yongdong Wu
JUCS
2010
155views more  JUCS 2010»
13 years 5 months ago
Watermarking Techniques for Relational Databases: Survey, Classification and Comparison
Abstract: Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of...
Raju Halder, Shantanu Pal, Agostino Cortesi