ABSTRACT
In this paper we are focusing on the use of a traitor tracing scheme for distribution models that are based on prerecorded or recordable physical media. When a pirated copy of the protected content is observed, the traitor tracing scheme allows the identification of at least one of the real subscribers who participated in the construction of the pirated copy. We show how we systematically assign the variations to users. We explore under what circumstances traitor tracing technology is applicable for media based distribution and then focus on two challenges specifically related to this form of distribution: We demonstrate a way to encode the variations on the disc that is mostly hidden from the attackers and also remarkably compatible with the existing DVD standard. We also present an efficient key management scheme to significantly reduce the requirement for non-volatile key storage on low-cost CE devices.
- A. Adelsbach, S. Katzenbeisser, and H. Veith. Watermarking schemes provably secure against copy and ambiguity attacks. In ACM Workshop on Digital Rights Management, Washington DC, 2003.]] Google ScholarDigital Library
- D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information theory, 44, No 5:1897--1905, 1998.]] Google ScholarDigital Library
- B. Chor, F. A, and M. Naor. Tracing traitors. In Crypto'94, Lecture Notes in computer science, Springer-Verlag, Berlin, Heidelberg, New York, volume 839, 1994.]] Google ScholarDigital Library
- B. Chor, F. A, M. Naor, and B. Pinkas. Tracing traitors. IEEE Transactions on Information Theory, 46, 2000.]] Google ScholarDigital Library
- I. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, Vol.6, no 12, 1997.]] Google ScholarDigital Library
- A. Fiat and M. Naor. Broadcast encryption. In Crypto'93, Lecture Notes in computer science, Springer-Verlag, Berlin, Heidelberg, New York, volume 773, 1993.]] Google ScholarDigital Library
- A. Fiat and T. Tassa. Dynamic traitor tracing. In Crypto'99, Lecture Notes in computer science, Springer-Verlag, Berlin, Heidelberg, New York, volume 1666, 1999.]] Google ScholarDigital Library
- D. S. J. N. Staddon and R. Wei. Combinatorial properties of frameproof and traceability codes. IEEE Transactions on Information Theory, 47, 2001.]] Google ScholarDigital Library
- H. Jin, J. Lotspiech, and M. Blaum. Efficient traitor tracing. In International Symposium on Communication Theory & Applications, 2003.]]Google Scholar
- S. Lin and D. J. Costello, 1983.]]Google Scholar
- R. Safavi-Naini and Y. Wang. Sequential traitor tracing. In Crypto'2000, Lecture Notes in computer science, Springer-Verlag, Berlin, Heidelberg, New York, volume 1880, 2000.]] Google ScholarDigital Library
- R. Safavi-Naini and Y. wang. Sequential traitor tracing. IEEE Transactions on Information Theory, 49, 2003.]] Google ScholarDigital Library
- J. Taylor. Dvd demystified, second edition, 2000.]] Google ScholarDigital Library
Index Terms
- Traitor tracing for prerecorded and recordable media
Recommendations
Renewable traitor tracing: a trace-revoke-trace system for anonymous attack
ESORICS'07: Proceedings of the 12th European conference on Research in Computer SecurityIn this paper we design renewable traitor tracing scheme for anonymous attack. When pirated copies of some copyrighted content or content decrypting key are found, a traitor tracing scheme could identify at least one of the real users (traitors) who ...
Efficient traitor tracing for clone attack in content protection
SAC '11: Proceedings of the 2011 ACM Symposium on Applied ComputingIn this paper we design efficient traitor tracing scheme for a pirate clone attack against a broadcast-encryption-based content protection system. In this content protection system, each user(device) is assigned a set of secret keys. In a clone attack, ...
Adaptive traitor tracing for large anonymous attack
DRM '08: Proceedings of the 8th ACM workshop on Digital rights managementIn this paper we focus on traitor tracing technologies for the anonymous re-broadcasting attack where the attackers re-distribute the per-content encrypting key or the decrypted plain content. To defend against an anonymous attack, content is usually ...
Comments