DocumentCode :
3619878
Title :
Traitor tracing against powerful attacks
Author :
S. McNicol;S. Boztas;A. Rao
Author_Institution :
Sch. of Math. & Geospatial Sci., RMIT Univ., Melbourne, Vic., Australia
fYear :
2005
fDate :
6/27/1905 12:00:00 AM
Firstpage :
1878
Lastpage :
1882
Abstract :
We describe narrow, erasure, hybrid and wide attacks on fingerprinting schemes used for securing digital content, and introduce new classes of codes, namely vector space block design codes and delta-nonlinear codes, which can be used to defend against such attacks by means of traitor tracing
Keywords :
"Data security","Fingerprint recognition","Australia","Subscriptions","Galois fields"
Publisher :
ieee
Conference_Titel :
Information Theory, 2005. ISIT 2005. Proceedings. International Symposium on
ISSN :
2157-8095
Print_ISBN :
0-7803-9151-9
Electronic_ISBN :
2157-8117
Type :
conf
DOI :
10.1109/ISIT.2005.1523671
Filename :
1523671
Link To Document :
بازگشت