Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,890,187 papers from all fields of science
Search
Sign In
Create Free Account
Traitor tracing
Traitor tracing schemes help trace the source of leaks when secret or proprietary data is sold to many customers.In a traitor tracing scheme, each…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Advanced Access Content System
Broadcast encryption
CD-ROM
Canary trap
Expand
Broader (1)
Copy protection
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Attribute-Based Traitor Tracing
Yongtao Wang
,
Kefei Chen
,
Jianhong Chen
Journal of information science and engineering
2011
Corpus ID: 18034557
In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the…
Expand
2010
2010
Traitor tracing over YouTube video service—proof of concept
Joan Tomàs-Buliart
,
Marcel Fernández
,
M. Soriano
Telecommunications Systems
2010
Corpus ID: 8100442
The development explained in this article proves that is possible to trace dishonest users who upload videos with sensitive…
Expand
2008
2008
Progressive Audio Scrambling in Compressed Domain
W. Yan
,
Wei-Gang Fu
,
M. Kankanhalli
IEEE transactions on multimedia
2008
Corpus ID: 3459580
Audio scrambling can be employed to ensure confidentiality in audio distribution. We first describe scrambling for raw audio…
Expand
2007
2007
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack
Hongxia Jin
,
J. Lotspiech
European Symposium on Research in Computer…
2007
Corpus ID: 34245093
In this paper we design renewable traitor tracing scheme for anonymous attack. When pirated copies of some copyrighted content or…
Expand
2006
2006
NIS07-4: Traitor Tracing Technology of Streaming Contents Delivery using Traffic Pattern in Wired/Wireless Environments
M. Dobashi
,
Hidehisa Nakayama
,
N. Kato
,
Y. Nemoto
,
A. Jamalipour
IEEE Globecom
2006
Corpus ID: 11549826
Today, with the rapid advance in broadband technology, digital contents delivery applications have been used widely and the…
Expand
2004
2004
Traitor tracing for prerecorded and recordable media
Hongxia Jin
,
J. Lotspiech
,
Stefan Nusser
ACM Digital Rights Management Workshop
2004
Corpus ID: 14223439
In this paper we are focusing on the use of a traitor tracing scheme for distribution models that are based on prerecorded or…
Expand
2004
2004
Soft-decision tracing in fingerprinted multimedia content
Marcel Fernández
,
M. Soriano
IEEE Multimedia
2004
Corpus ID: 9864510
To protect intellectual property and distribution rights against dishonest customers in the multimedia content market…
Expand
2003
2003
An Anonymous Asymmetric Public Key Traitor Tracing Scheme
E. Choi
,
J. Hwang
,
Dong Hoon Lee
International Conference on Electronic Commerce…
2003
Corpus ID: 43321869
In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude…
Expand
Review
2003
Review
2003
Overview of Traitor Tracing Schemes
Jarrod Trevathan
,
Hossein Ghodosi
,
B. Litow
2003
Corpus ID: 60989869
Traitor tracing schemes were designed for use in a broadcast/network environment where piracy is a major problem. Legitimate…
Expand
2000
2000
An efficient traitor tracing scheme for broadcast encryption
Maki Yoshida
,
Toru Fujiwara
IEEE International Symposium on Information…
2000
Corpus ID: 57210646
An efficient traitor tracing scheme for broadcast encryption is proposed. Its security depends on the difficulty of discrete…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE