Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/357744.357909acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
Article
Free access

Multimedia content protection by cryptography and watermarking in tamper-resistant hardware

Published: 04 November 2000 Publication History

Abstract

With the rapid growth of broadband network, distribution of multimedia via Internet is a must way to go. Content protection has become one of the most significant and challenging problems of this field. In this paper, we propose a general scheme that combines public key cryptography and watermarking technology together, to achieve wonderful content protection. The scheme is reliable, flexible and efficient.

References

[1]
R. Anderson and M. Kuhn, "Low cost attacks on tamper resistant devices", in Security protocols: International Workshop'97, LNCS 1361, Springer-Verlag, pp.125-136, 1997.
[2]
F. Bao, R. Deng, Y. Han, A. Jeng, D. Narasimhalu, T. Nagir, "Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults", The Second Workshop on Secure Protocols, Pads, April, 1997, LNCS, Springer-Verlag, 1997.
[3]
F. Bao, Q. Sun, J. Hu, R.H. Deng, J. Wu, "Copyright protection through watermarking: towards tracing illegal Users", The 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems (ISPACS'98), 4.-6. November 1998, Melbourne, Australia, 1998.
[4]
D. Boneh, R. DeMillo, and R. Lipton. "On the importance of checking cryptographic protocols for faults", in Proceedings of Eurocrypt '97, LNCS 1233, Springer-Verlag, pp. 37--51, 1997.
[5]
I.J. Cox, J.P.M.G. Linnartz, "Some general methods for tampering with watermarks", in IEEE international Conference on Image Processing", 1997.
[6]
S. Craver, N. Memon, B. Yeo, M. Yeung, "Can invisible watermarks resolve rightful ownership", IBM Research Report, RC 20509, July 25, 1996.
[7]
C. Griwodz, O. Merkel, J. Dittmann, R. Steinmetz, "Protecting VoD the Easier Way", ACM Multimedia '98, pp. 21- 28, Bristol, UK, 1998.
[8]
R. Jain, "The convergence of PCs and TV", IEEE Multimedia, October/December 1999.
[9]
P. Kocher, http://www.cryptography.com/resources/
[10]
B.M. Macq and J.-J. Quisquater, "Cryptology for digital TV broadcasting", Proceedings of the IEEE, Vol. 83, No, 6, pp. 944-957, 1995.
[11]
T. Maples and G. Spanos, "Performance study of a selective Encryption scheme for security of networked, real-time video", Proc. of the 4th International Conference on Computer and Communications and Networks, Las Vegas, Nevada, Sept, 1995.
[12]
B. Pfitzmann and M. Shunter, "Asymmetric fingerprinting", Eurocrypt'96, LNCS 1070, pp. 84-95, Springer-Verlag, 1996.
[13]
B. Pfitzmann and A. Sadeghi, "Coin-based anonymous fingerprinting", Eurocrypt'99, pp. 150-164, Springer-Verlag, 1999.
[14]
L. Qiao, K. Nahrstedt, and I. Tam, "Is MPEG encryption using random lists instead of Zig Zag Order", IEEE International Symposium on Consumer Electronics, Dec, 1997.
[15]
R.A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986.
[16]
L. Tang, "Methods for Encrypting and decrypting MPEG video data efficiently", Proc. of the 4th ACM Multimedia Conference, Boston, MA, November, 1996.
[17]
J. Zhao and E. Koch, "Embedding robust label into images for copyright protection", Proceedings of the International Conference on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Austria, Aug. 21-25, 1995.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MULTIMEDIA '00: Proceedings of the 2000 ACM workshops on Multimedia
November 2000
248 pages
ISBN:1581133111
DOI:10.1145/357744
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2000

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. multimedia content protection
  2. public key cryptography
  3. tamper-resistant hardware
  4. watermarking technology

Qualifiers

  • Article

Conference

MM00: ACM Multimedia 2000
October 30 - November 3, 2000
California, Los Angeles, USA

Acceptance Rates

Overall Acceptance Rate 2,010 of 7,772 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)29
  • Downloads (Last 6 weeks)5
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Qualitative Analysis on Watermarking Algorithm for Large Resolution Camera Phone ImageProceedings of the 2014 International Conference on Computer and Communication Engineering10.1109/ICCCE.2014.39(100-103)Online publication date: 23-Sep-2014
  • (2011)Digital fingerprintingInternational Journal of Information and Computer Security10.1504/IJICS.2011.0448224:4(316-331)Online publication date: 1-Jan-2011
  • (2009)Hardware assisted watermarking for multimediaComputers and Electrical Engineering10.1016/j.compeleceng.2008.06.00235:2(339-358)Online publication date: 1-Mar-2009
  • (2008)An improved SVD-based watermarking scheme for protecting rightful ownershipSignal Processing10.1016/j.sigpro.2008.02.01588:9(2158-2180)Online publication date: 1-Sep-2008
  • (2005)On Multicast Fingerprinting and Collusion SecurityProceedings of the First International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution10.1109/AXMEDIS.2005.37Online publication date: 30-Nov-2005
  • (2004)Video waterscramblingEURASIP Journal on Advances in Signal Processing10.1155/S11108657044010612004(2224-2237)Online publication date: 1-Jan-2004
  • (2004)Multimedia security in the distributed environmentAPCC/MDMC '04. The 2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceeding10.1109/APCC.2004.1391793(639-642)Online publication date: 2004
  • (2004)Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer CooperationResearch Directions in Data and Applications Security XVIII10.1007/1-4020-8128-6_20(295-309)Online publication date: 2004
  • (2003)Self-manifestation of composite multimedia objects to satisfy security constraintsProceedings of the 2003 ACM symposium on Applied computing10.1145/952532.952715(927-934)Online publication date: 9-Mar-2003

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media