{"title":"Traitor tracing against powerful attacks","authors":"Simon McNicol, S. Boztaş, Asha Rao","doi":"10.1109/ISIT.2005.1523671","DOIUrl":null,"url":null,"abstract":"We describe narrow, erasure, hybrid and wide attacks on fingerprinting schemes used for securing digital content, and introduce new classes of codes, namely vector space block design codes and delta-nonlinear codes, which can be used to defend against such attacks by means of traitor tracing","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2005.1523671","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
We describe narrow, erasure, hybrid and wide attacks on fingerprinting schemes used for securing digital content, and introduce new classes of codes, namely vector space block design codes and delta-nonlinear codes, which can be used to defend against such attacks by means of traitor tracing