In one proposed use of digital watermarks, the owner of a document D sells slightly diierent documents, D 1 ; D 2 ; : : : to each buyer; if a buyer posts his/her document D i to the web, the owner can identify the source of the leak. More general attacks are however possible in which k buyers create some composite document D ; the goal of the owner is to identify at least one of the conspirator...