Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Traitor Tracing in Mobile Multimedia Communication

Traitor Tracing in Mobile Multimedia Communication
View Sample PDF
Author(s): Shiguo Lian (France Telecom R&D Beijing Center, China)
Copyright: 2009
Pages: 15
Source title: Handbook of Research on Mobile Multimedia, Second Edition
Source Author(s)/Editor(s): Ismail Khalil (Johannes Kepler University Linz, Austria)
DOI: 10.4018/978-1-60566-046-2.ch030


View Traitor Tracing in Mobile Multimedia Communication on the publisher's website for pricing and purchasing information.


Digital fingerprinting is reported and used in copy tracing. It embeds different information, for example, Customer ID, into multimedia content, produces a different copy, and sends the copy to the corresponding customer. If a copy is spread to unauthorized customers, the unique information in the copy can be detected and used to trace the illegal distributors. In this chapter, we introduce some digital fingerprinting algorithms, review the existing traitor tracing schemes, analyze the performances of some typical algorithms through comparison, and propose the future trends and some open issues in this field. It is expected to provide some valuable information to researchers or engineers working in mobile multimedia security.

Related Content

K. Jairam Naik, Annukriti Soni. © 2021. 18 pages.
Randhir Kumar, Rakesh Tripathi. © 2021. 22 pages.
Yogesh Kumar Gupta. © 2021. 38 pages.
Kamel H. Rahouma, Ayman A. Ali. © 2021. 34 pages.
Muni Sekhar Velpuru. © 2021. 19 pages.
Vijayakumari B.. © 2021. 24 pages.
Neetu Faujdar, Anant Joshi. © 2021. 41 pages.
Body Bottom