Masaru Dobashi

  • Citations Per Year
Learn More
Today, with the rapid advance in broadband technology, digital contents delivery applications have been used widely and the streaming technology has made the contents delivery more popular. Nowadays, there is high expectation on Digital Rights Management (DRM). Traitor Tracing is one of the DRM technologies and enables us to observe user’s contents(More)
The tracing scheme is using similarity of traffic pattern to trace the source of leaks when sensitive or proprietary data is made available to large set of parties. On the other hand we must implement digital rights management (DRM) to control content spreading and to avoid unintended content use. General tracing methods use either watermarking or(More)
  • 1