skip to main content
10.1145/1029146.1029160acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Traitor tracing for prerecorded and recordable media

Published:25 October 2004Publication History

ABSTRACT

In this paper we are focusing on the use of a traitor tracing scheme for distribution models that are based on prerecorded or recordable physical media. When a pirated copy of the protected content is observed, the traitor tracing scheme allows the identification of at least one of the real subscribers who participated in the construction of the pirated copy. We show how we systematically assign the variations to users. We explore under what circumstances traitor tracing technology is applicable for media based distribution and then focus on two challenges specifically related to this form of distribution: We demonstrate a way to encode the variations on the disc that is mostly hidden from the attackers and also remarkably compatible with the existing DVD standard. We also present an efficient key management scheme to significantly reduce the requirement for non-volatile key storage on low-cost CE devices.

References

  1. A. Adelsbach, S. Katzenbeisser, and H. Veith. Watermarking schemes provably secure against copy and ambiguity attacks. In ACM Workshop on Digital Rights Management, Washington DC, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information theory, 44, No 5:1897--1905, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Chor, F. A, and M. Naor. Tracing traitors. In Crypto'94, Lecture Notes in computer science, Springer-Verlag, Berlin, Heidelberg, New York, volume 839, 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Chor, F. A, M. Naor, and B. Pinkas. Tracing traitors. IEEE Transactions on Information Theory, 46, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. I. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, Vol.6, no 12, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Fiat and M. Naor. Broadcast encryption. In Crypto'93, Lecture Notes in computer science, Springer-Verlag, Berlin, Heidelberg, New York, volume 773, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Fiat and T. Tassa. Dynamic traitor tracing. In Crypto'99, Lecture Notes in computer science, Springer-Verlag, Berlin, Heidelberg, New York, volume 1666, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. S. J. N. Staddon and R. Wei. Combinatorial properties of frameproof and traceability codes. IEEE Transactions on Information Theory, 47, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. Jin, J. Lotspiech, and M. Blaum. Efficient traitor tracing. In International Symposium on Communication Theory & Applications, 2003.]]Google ScholarGoogle Scholar
  10. S. Lin and D. J. Costello, 1983.]]Google ScholarGoogle Scholar
  11. R. Safavi-Naini and Y. Wang. Sequential traitor tracing. In Crypto'2000, Lecture Notes in computer science, Springer-Verlag, Berlin, Heidelberg, New York, volume 1880, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Safavi-Naini and Y. wang. Sequential traitor tracing. IEEE Transactions on Information Theory, 49, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Taylor. Dvd demystified, second edition, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Traitor tracing for prerecorded and recordable media

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        DRM '04: Proceedings of the 4th ACM workshop on Digital rights management
        October 2004
        120 pages
        ISBN:1581139691
        DOI:10.1145/1029146

        Copyright © 2004 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 October 2004

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader