ABSTRACT
In this paper, we describe SCOTT: a demonstration system that uses the Set Cover Tracing algorithm for determining the source of pirate content. This algorithm is very efficient in dealing with collusion attacks - the performance is close to linear in the number of colluders. However, the algorithm is based on the Set Cover Problem, which is known to be NP hard. SCOTT confirms the assertion in the original paper that a set cover algorithm is efficient in this particular application. The SCOTT system is suitable for use in a commercial application; the most notable of which is tracing the source of pirate Blu-ray movies. (Blu-ray players contain a built-in tracing traitors key assignment.) It also contains a visualization of the tracing process. After each pirate movie, SCOTT displays the universal of all players and its estimate of guilt for each player.
- Chor, B., Fiat, A., Naor, M. Tracing Traitors, Proc. Of 14th Int. Cryptology Conf., p. 257--270, August 21-25, 1994. Google ScholarDigital Library
- Jin, H. and Lotspiech, J. Unified Broadcast Encryption and Traitor Tracing for Content Protection ACSAC 09, 7--11. Google ScholarDigital Library
- Jin, H., Lotspiech, J, and Megiddo, N. Efficient Coalition Detection for Traitor Tracing, IFIP SEC'08, Sept 9-12, 2008Google ScholarCross Ref
- Advanced Access Content System, www.aacsla.comGoogle Scholar
- Blu-ray disc, http://www.blu-raydisc.com/en.htmlGoogle Scholar
Index Terms
- SCOTT: set cover tracing technology
Recommendations
The privacy of tracing traitors
DRM '10: Proceedings of the tenth annual ACM workshop on Digital rights managementIn this talk I will explore a connection between traitor tracing schemes and the problem of sanitizing data to remove personal information while allowing statistically meaningful information to be released. It is based on joint work with Cynthia Dwork, ...
Efficient Trace and Revoke Schemes
FC '00: Proceedings of the 4th International Conference on Financial CryptographyOur goal is to design encryption schemes for mass distribution of data in which it is possible to (1) deter users from leaking their personal keys, (2) trace which users leaked keys to construct an illegal decryption device, and (3) revoke these keys as ...
A Multimedia Tracing Traitors Scheme Using Multi-level Hierarchical Structure for Tardos Fingerprint Based Audio Watermarking
ICETE 2014: Proceedings of the 11th International Joint Conference on e-Business and Telecommunications - Volume 5This paper presents a novel approach in tracing traitors field. It proposes a multi-level hierarchical structure to the used probabilistic fingerprinting code; the well known Tardos code. This proposed structure is performed to address the problem of ...
Comments