Reference Hub1
Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution

Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution

Hongxia Jin
Copyright: © 2009 |Volume: 1 |Issue: 1 |Pages: 16
ISSN: 1941-6210|EISSN: 1941-6229|ISSN: 1941-6210|EISBN13: 9781615202218|EISSN: 1941-6229|DOI: 10.4018/jdcf.2009010104
Cite Article Cite Article

MLA

Jin, Hongxia. "Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution." IJDCF vol.1, no.1 2009: pp.59-74. http://doi.org/10.4018/jdcf.2009010104

APA

Jin, H. (2009). Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution. International Journal of Digital Crime and Forensics (IJDCF), 1(1), 59-74. http://doi.org/10.4018/jdcf.2009010104

Chicago

Jin, Hongxia. "Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution," International Journal of Digital Crime and Forensics (IJDCF) 1, no.1: 59-74. http://doi.org/10.4018/jdcf.2009010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article discusses a forensic technology that is used to defend against piracy for secure multimedia content distribution. In particular we are interested in anonymous rebroadcasting type of attack where the attackers redistribute the per-content encrypting key or decrypted plain content. Traitor tracing technology can be used to defend against this attack by identifying the original users (called traitors) involved in the rebroadcasting piracy. While traitor tracing has been a long standing cryptographic problem that has attracted extensive research, existing academia researches have overlooked many practical concerns in a real world setting. We have overcome many practical concerns in order to bring a theoretical traitor tracing solution to practice. The main focus of this article is on designing efficient forensic analysis algorithms under various practical considerations that were missing from existing work. The efficiency of our forensic analysis algorithms is the enabling factor that ultimately made the first time large scale commercialization of a traitor tracing technology in the context of new industry standard on content protection for next generation high-definition DVDs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.