Randomised Dynamic Traitor Tracing
File version
Version of Record (VoR)
Author(s)
Read, Wayne
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Pedro Assuncao and Sergio Faria
Date
Size
File type(s)
Location
Setubal, Portugal
License
Abstract
Dynamic traitor tracing schemes are used to trace the source of piracy in broadcast environments such as cable TV. Dynamic schemes divide content into a series of watermarked segments that are then broadcast. The broadcast provider can adapt the watermarks according to the pirate's response and eventually trace him/her. As dynamic algorithms are deterministic, for a given set of inputs, the tracing algorithm will execute exactly the same way each time. An adversary can use this knowledge to ensure that the tracing algorithm is forced into executing at its worst case bound. In this paper we review dynamic traitor tracing schemes and describe why determinism is a problem. We ammend several existing dynamic tracing algorithms by incorporating randomised decisions. This eliminates any advantage an adversary has in terms of the aforementioned attack, as he/she no longers knows exactly how the tracing algorithm will execute. Simulations show that the randomising modifications influence each dynamic algorithm to run at its average case complexity in terms of tracing time. We provide an efficiency analysis of the amended algorithms and give some recommendations for reducing overhead.
Journal Title
Conference Title
Proceedings of the International Conference on Signal Processing and Multimedia Applications
Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
© 2006 ScitePress. This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 4.0 International (CC BY-NC-ND 4.0) License, which permits unrestricted, non-commercial use, distribution and reproduction in any medium, providing that the work is properly cited.
Item Access Status
Note
Access the data
Related item(s)
Subject
Cybersecurity and privacy not elsewhere classified
Other information and computing sciences not elsewhere classified
Science & Technology
Computer Science, Information Systems
Telecommunications
Persistent link to this record
Citation
Trevathan, J; Read, W, Randomised Dynamic Traitor Tracing, Proceedings of the International Conference on Signal Processing and Multimedia Applications, 2006, pages 323-332