Identification algorithms for sequential traitor tracing

  • Authors:
  • Marcel Fernandez;Miguel Soriano

  • Affiliations:
  • Department of Telematics Engineering, Universitat Politècnica de Catalunya, Barcelona, Spain;Department of Telematics Engineering, Universitat Politècnica de Catalunya, Barcelona, Spain

  • Venue:
  • INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Sequential traitor tracing schemes [10,11] are generally used to deter piracy in multimedia content delivery scenarios. This is accomplished by embedding the codewords of a code with traceability properties into the content, prior to its delivery. The focus of this paper is on tracing algorithms for sequential traitor tracing schemes, where soft-decision list decoding techniques are applied in order to improve the identification process in the original sequential traitor tracing schemes, where where a brute force approach is used.