Anonymous Fingerprinting of electronic information with automatic identification of redistributors
نویسنده
چکیده
منابع مشابه
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors
As the markets of digital contents over computer networks become more popular, illegal redistribution of contents by a buyer becomes the more serious problem. To deter illegal redistribution, various fingerprinting schemes have been proposed. The fingerprinting schemes enable merchants to embed information which identifies the original buyer to the purchased content. Identifying the original bu...
متن کاملEfficient Smart-Card Based Anonymous Fingerprinting
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as a technique for copyright protection which is compatible with buyer anonymity in electronic transactions. However, the complexity of known algorithms for anonymous fingerprinting is too high for practical implementation on sta...
متن کاملAnonymous Fingerprinting Based on Committed Oblivious Transfer
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as a technique for copyright protection which is compatible with buyer anonymity in electronic transactions. However, the complexity of known algorithms for anonymous fingerprinting deters their practical implementation, since th...
متن کاملEecient Smart-card Based Anonymous Fingerprinting ?
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous ngerprinting has appeared as a technique for copyright protection which is compatible with buyer anonymity in electronic transactions. However, the complexity of known algorithms for anonymous ngerprinting is too high for practical implementation on standar...
متن کاملAnonymous Fingerprinting
Fingerprinting schemes deter people from illegally redistributing digital data by enabling the original merchant of the data to identify the original buyer of a redistributed copy. Recently, asymmetric fingerprinting schemes were introduced. Here, only the buyer knows the fingerprinted copy after a sale, and if the merchant finds this copy somewhere, he obtains a proof that it was the copy of t...
متن کامل