• myGriffith
    • Staff portal
    • Contact Us⌄
      • Future student enquiries 1800 677 728
      • Current student enquiries 1800 154 055
      • International enquiries +61 7 3735 6425
      • General enquiries 07 3735 7111
      • Online enquiries
      • Staff phonebook
    View Item 
    •   Home
    • Griffith Research Online
    • Journal articles
    • View Item
    • Home
    • Griffith Research Online
    • Journal articles
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

  • All of Griffith Research Online
    • Communities & Collections
    • Authors
    • By Issue Date
    • Titles
  • This Collection
    • Authors
    • By Issue Date
    • Titles
  • Statistics

  • Most Popular Items
  • Statistics by Country
  • Most Popular Authors
  • Support

  • Contact us
  • FAQs
  • Admin login

  • Login
  • A New Class of Traceability Schemes for Protecting Digital Content against Illegal Re-distribution

    Author(s)
    Wu, Xin-Wen
    Sattar, Abdul
    Griffith University Author(s)
    Sattar, Abdul
    Year published
    2011
    Metadata
    Show full item record
    Abstract
    Traceability schemes are used to protect the rights of intellectual-property owners against illegal re-distribution. In order to trace a pirate copy back to a user who has been involved in making and re-distributing the pirate copy, a traceability scheme requires a code which contains a sufficient number of codewords and a traitor-tracing algorithm. Codes with the identifiable parent property (IPP codes) and traceability codes (TA codes) have been extensively studied. IPP codes include all TA codes as special instances. However, TA codes usually implement efficient tracing algorithms, while IPP codes do not always ...
    View more >
    Traceability schemes are used to protect the rights of intellectual-property owners against illegal re-distribution. In order to trace a pirate copy back to a user who has been involved in making and re-distributing the pirate copy, a traceability scheme requires a code which contains a sufficient number of codewords and a traitor-tracing algorithm. Codes with the identifiable parent property (IPP codes) and traceability codes (TA codes) have been extensively studied. IPP codes include all TA codes as special instances. However, TA codes usually implement efficient tracing algorithms, while IPP codes do not always have efficient tracing algorithms. A major theoretical challenge is to derive more codes which have efficient tracing algorithms. The contributions of this paper include a new class of traceability codes, as well as an efficient tracing algorithm for the new traceability codes. The proposed tracing algorithm has the same complexity as the traditional tracing algorithm and can outperform the traditional tracing algorithm.
    View less >
    Journal Title
    International Journal of Computer Science and Network Security
    Volume
    11
    Issue
    12
    Publisher URI
    http://paper.ijcsns.org/07_book/html/201112/201112014.html
    http://paper.ijcsns.org/07_book/201112/20111214.pdf
    Subject
    Theory of computation
    Cybersecurity and privacy not elsewhere classified
    Publication URI
    http://hdl.handle.net/10072/42735
    Collection
    • Journal articles

    Footer

    Disclaimer

    • Privacy policy
    • Copyright matters
    • CRICOS Provider - 00233E
    • TEQSA: PRV12076

    Tagline

    • Gold Coast
    • Logan
    • Brisbane - Queensland, Australia
    First Peoples of Australia
    • Aboriginal
    • Torres Strait Islander