{"title":"为预先录制的和可记录的媒体追踪叛徒","authors":"Hongxia Jin, J. Lotspiech, Stefan Nusser","doi":"10.1145/1029146.1029160","DOIUrl":null,"url":null,"abstract":"In this paper we are focusing on the use of a traitor tracing scheme for distribution models that are based on prerecorded or recordable physical media. When a pirated copy of the protected content is observed, the traitor tracing scheme allows the identification of at least one of the real subscribers who participated in the construction of the pirated copy. We show how we systematically assign the variations to users. We explore under what circumstances traitor tracing technology is applicable for media based distribution and then focus on two challenges specifically related to this form of distribution: We demonstrate a way to encode the variations on the disc that is mostly hidden from the attackers and also remarkably compatible with the existing DVD standard. We also present an efficient key management scheme to significantly reduce the requirement for non-volatile key storage on low-cost CE devices.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"48","resultStr":"{\"title\":\"Traitor tracing for prerecorded and recordable media\",\"authors\":\"Hongxia Jin, J. Lotspiech, Stefan Nusser\",\"doi\":\"10.1145/1029146.1029160\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we are focusing on the use of a traitor tracing scheme for distribution models that are based on prerecorded or recordable physical media. When a pirated copy of the protected content is observed, the traitor tracing scheme allows the identification of at least one of the real subscribers who participated in the construction of the pirated copy. We show how we systematically assign the variations to users. We explore under what circumstances traitor tracing technology is applicable for media based distribution and then focus on two challenges specifically related to this form of distribution: We demonstrate a way to encode the variations on the disc that is mostly hidden from the attackers and also remarkably compatible with the existing DVD standard. We also present an efficient key management scheme to significantly reduce the requirement for non-volatile key storage on low-cost CE devices.\",\"PeriodicalId\":124354,\"journal\":{\"name\":\"ACM Digital Rights Management Workshop\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-10-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"48\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Digital Rights Management Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1029146.1029160\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Digital Rights Management Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1029146.1029160","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Traitor tracing for prerecorded and recordable media
In this paper we are focusing on the use of a traitor tracing scheme for distribution models that are based on prerecorded or recordable physical media. When a pirated copy of the protected content is observed, the traitor tracing scheme allows the identification of at least one of the real subscribers who participated in the construction of the pirated copy. We show how we systematically assign the variations to users. We explore under what circumstances traitor tracing technology is applicable for media based distribution and then focus on two challenges specifically related to this form of distribution: We demonstrate a way to encode the variations on the disc that is mostly hidden from the attackers and also remarkably compatible with the existing DVD standard. We also present an efficient key management scheme to significantly reduce the requirement for non-volatile key storage on low-cost CE devices.