Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread
暂无分享,去创建一个
Digital rights management (DRM) technologies have recently received many blows that might hamper their future. Copyright holders, by imposing tight restrictions on their assets' usability, have managed to infuriate consumers to the point at which the music industry has partly dropped DRM. Is multimedia content protection dead? Well, not quite yet. Discreet protection technologies, such as content fingerprinting and traitor tracing, are receiving increasing interest. Strictly speaking, these technologies don't prevent piracy. Instead, they permit enforcement of a damage control policy should piracy occur. Here, we focus on these technologies, particularly traitor tracing, which perhaps offers the most promising way to navigate the complex maze of Internet content piracy.
[1] Hongxia Jin,et al. Traitor tracing for prerecorded and recordable media , 2004, DRM '04.
[2] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[3] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[4] Boris Skoric,et al. Tardos Fingerprinting is Better Than We Thought , 2006, IEEE Transactions on Information Theory.
[5] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.