Fingerprinting for broadcast content distribution system

Minoru Kuribayashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)


The objective of traitor tracing technique is to enable a broadcaster to identify illegal users from secret keys issued to them. In a broadcast encryption scheme, although a broadcaster can identify a traitor when a secret key is leaked, the decrypted copy is not protected from illegal distribution. In the fingerprinting scheme, a broadcaster can trace illegal users from a pirated copy because each user purchases the copy watermarked by his own fingerprint. However, the transaction to distribute the copy is one-to-one. In this paper, we have proposed a broadcast-type fingerprinting scheme such that only authorized users who have own decryption key can obtain the fingerprinted copy.

Original languageEnglish
Title of host publicationDigital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Revised Selected Papers
PublisherSpringer Verlag
Number of pages13
ISBN (Print)9783319319599
Publication statusPublished - 2016
Event14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015 - Tokyo, Japan
Duration: Oct 7 2015Oct 10 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)03029743
ISSN (Electronic)16113349


Other14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015

ASJC Scopus subject areas

  • General Computer Science
  • Theoretical Computer Science


Dive into the research topics of 'Fingerprinting for broadcast content distribution system'. Together they form a unique fingerprint.

Cite this