IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Traitor Tracing in Mobile Multimedia Communication

Traitor Tracing in Mobile Multimedia Communication
View Sample PDF
Author(s): Shiguo Lian (France Telecom R&D Beijing Center, China)
Copyright: 2009
Pages: 15
Source title: Handbook of Research on Mobile Multimedia, Second Edition
Source Author(s)/Editor(s): Ismail Khalil (Johannes Kepler University Linz, Austria)
DOI: 10.4018/978-1-60566-046-2.ch030

Purchase

View Traitor Tracing in Mobile Multimedia Communication on the publisher's website for pricing and purchasing information.

Abstract

Digital fingerprinting is reported and used in copy tracing. It embeds different information, for example, Customer ID, into multimedia content, produces a different copy, and sends the copy to the corresponding customer. If a copy is spread to unauthorized customers, the unique information in the copy can be detected and used to trace the illegal distributors. In this chapter, we introduce some digital fingerprinting algorithms, review the existing traitor tracing schemes, analyze the performances of some typical algorithms through comparison, and propose the future trends and some open issues in this field. It is expected to provide some valuable information to researchers or engineers working in mobile multimedia security.

Related Content

Nithin Kalorth, Vidya Deshpande. © 2024. 7 pages.
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane. © 2024. 24 pages.
T.S. Sujith. © 2024. 13 pages.
C. Suganya, M. Vijayakumar. © 2024. 11 pages.
B. Harry, Vijayakumar Muthusamy. © 2024. 19 pages.
Munise Hayrun Sağlam, Ibrahim Kirçova. © 2024. 19 pages.
Elif Karakoç Keskin. © 2024. 19 pages.
Body Bottom