Traitor Tracing for Multimedia Forensics

Traitor Tracing for Multimedia Forensics

Hongxia Jin
Copyright: © 2009 |Pages: 22
DOI: 10.4018/978-1-59904-869-7.ch015
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter discusses the cryptographic traitor tracing technology that is used to defend against piracy in multimedia content distribution. It talks about different potential pirate attacks in a multimedia content distribution system. It discusses how traitor tracing technologies can be used to defend against those attacks by identifying the attackers involved in the piracy. While traitor tracing has been a long standing cryptographic problem that has attracted extensive research, the main purpose of this chapter is to show how to overcome many practical concerns in order to bring a theoretical solution to practice. Many of these practical concerns have been overlooked in academic research. The author brings firsthand experience on bringing this technology to practice in the context of new industry standards on content protection for next generation high-definition DVDs. The author also hopes to shed new insightson future research directions in this space.
Chapter Preview
Top

Background

A number of business models have emerged, whose success hinges on the ability to securely distribute digital content only to paying customers. Examples of these business models include pay-TV systems (Cable companies) or movie rental companies like Netflix, and massively distributing prerecorded and recordable media. These typical content protection applications imply a one-way broadcast nature. To ensure the content is only consumed by authorized users, broadcast encryption technologies are used.

Complete Chapter List

Search this Book:
Reset