DocumentCode :
2956682
Title :
Hybrid Traitor Tracing
Author :
Jin, Hongxia ; Lotspiech, Jeffery
Author_Institution :
IBM Almaden Res. Center, San Jose, CA
fYear :
2006
fDate :
9-12 July 2006
Firstpage :
1329
Lastpage :
1332
Abstract :
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing scheme allows one to identify at least one of the real users (traitors) who participate in the construction of the pirated copy. The authors have been involved in what we believe is the first large-scale deployment of the tracing traitors approach. In this paper we shall present a key management scheme that provides the system designer flexibility, in that he/she can choose to trace down to an individual user or only trace to a device´s model. It helps effectively defend against class attack and evil manufacturer problem. It also provides a technology to protect consumers´ privacy when needed. This flexibility is believed to be needed and has been adopted by content protection standard AACS for next generation DVDs
Keywords :
content management; copy protection; copyright; cryptography; digital versatile discs; AACS content protection standard; DVD; advanced access content system; copyrighted material; key management scheme; traitor tracing scheme; Broadcasting; Building materials; Cloning; DVD; Data security; Forensics; Large-scale systems; Manufacturing; Motion pictures; Protection; key management; next generation DVD; traitor tracing; watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia and Expo, 2006 IEEE International Conference on
Conference_Location :
Toronto, Ont.
Print_ISBN :
1-4244-0366-7
Electronic_ISBN :
1-4244-0367-7
Type :
conf
DOI :
10.1109/ICME.2006.262784
Filename :
4036853
Link To Document :
بازگشت