메뉴 건너뛰기




Volumn 15, Issue 1, 2006, Pages 12-29

Fingerprint multicast in secure video streaming

Author keywords

Fingerprint multicast; Multimedia security; Streaming video; Traitor tracing

Indexed keywords

BANDWIDTH; DIGITAL STORAGE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; EMBEDDED SYSTEMS; MATHEMATICAL MODELS; MATRIX ALGEBRA; MODULATION; SECURITY OF DATA; VIDEO ON DEMAND;

EID: 30144437180     PISSN: 10577149     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIP.2005.860356     Document Type: Article
Times cited : (36)

References (29)
  • 1
    • 0031362116 scopus 로고    scopus 로고
    • "Secure spread spectrum watermarking for multimedia"
    • Dec
    • Cox, J. Killian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
    • (1997) IEEE Trans. Image Process. , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.1    Killian, J.2    Leighton, F.3    Shamoon, T.4
  • 2
    • 0038527384 scopus 로고    scopus 로고
    • "Anti-collusion figerprinting for multimedia"
    • Apr
    • W. Trappe, M. Wu, Z. Wang, and K. J. R. Liu, "Anti-collusion figerprinting for multimedia," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.4 , pp. 1069-1087
    • Trappe, W.1    Wu, M.2    Wang, Z.3    Liu, K.J.R.4
  • 4
    • 85032751604 scopus 로고    scopus 로고
    • "Collusion resistant fingerprint for multimedia"
    • Mar
    • M. Wu, W. Trappe, Z. J. Wang, and K. J. R. Liu, "Collusion resistant fingerprint for multimedia," IEEE Signal Process. Mag., vol. 21, no. 2, pp. 15-27, Mar. 2004.
    • (2004) IEEE Signal Process. Mag. , vol.21 , Issue.2 , pp. 15-27
    • Wu, M.1    Trappe, W.2    Wang, Z.J.3    Liu, K.J.R.4
  • 6
    • 0035009221 scopus 로고    scopus 로고
    • "Modeling the branching characteristics and efficiency gains in global multicast trees"
    • Apr
    • R. Chalmers and K. Almeroth, "Modeling the branching characteristics and efficiency gains in global multicast trees," in IEEE InfoCom 2001, vol. 1, Apr. 2001, pp. 449-458.
    • (2001) IEEE InfoCom 2001 , vol.1 , pp. 449-458
    • Chalmers, R.1    Almeroth, K.2
  • 8
    • 0032162672 scopus 로고    scopus 로고
    • "Collusion-secure fingerprinting for digital data"
    • Sep
    • D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 9
    • 84873648175 scopus 로고    scopus 로고
    • "Enabling hierarchical and bulk-distribution for watermarked content"
    • presented at the 17th Annu. Computer Security Applications Conf., New Orleans, LA, Dec
    • G. Caronni and C. Schuba, "Enabling hierarchical and bulk-distribution for watermarked content," presented at the 17th Annu. Computer Security Applications Conf., New Orleans, LA, Dec. 2001.
    • (2001)
    • Caronni, G.1    Schuba, C.2
  • 10
    • 30144438818 scopus 로고    scopus 로고
    • "Commercial dissemination of video over open networks: Issues and approaches"
    • Object Systems Group, Center Univ. d'Informatique, Univ. Geneva, Geneva, Switzerland
    • D. Konstantas and D. Thanos, "Commercial dissemination of video over open networks: Issues and approaches," Object Systems Group, Center Univ. d'Informatique, Univ. Geneva, Geneva, Switzerland, 2000.
    • (2000)
    • Konstantas, D.1    Thanos, D.2
  • 11
    • 30144438577 scopus 로고    scopus 로고
    • "Enabling hierarchical and bulk-distribution for watermarked content"
    • presented at the IFIP TC6/TC11 Int. Conf. Communications and Multimedia Security Issues, May
    • R. Parviainen and R. Parnes, "Enabling hierarchical and bulk-distribution for watermarked content," presented at the IFIP TC6/TC11 Int. Conf. Communications and Multimedia Security Issues, vol. 192, May 2001.
    • (2001) , vol.192
    • Parviainen, R.1    Parnes, R.2
  • 12
    • 84957663275 scopus 로고    scopus 로고
    • "Watercasting: Distributed watermarking of multicast media"
    • Pisa, Italy, Nov
    • I. Brown, C. Perkins, and J. Crowcroft, "Watercasting: Distributed watermarking of multicast media," in Network Group Commun., Pisa, Italy, Nov. 1999, pp. 286-300.
    • (1999) Network Group Commun. , pp. 286-300
    • Brown, I.1    Perkins, C.2    Crowcroft, J.3
  • 13
    • 10044241476 scopus 로고    scopus 로고
    • "Whim: Watermarking multicast video with a hierarchy of intermediaries"
    • presented at the NOSSDAC, Chapel Hill, NC, Jun
    • P. Judge and M. Ammar, "Whim: Watermarking multicast video with a hierarchy of intermediaries," presented at the NOSSDAC, Chapel Hill, NC, Jun. 2000.
    • (2000)
    • Judge, P.1    Ammar, M.2
  • 14
    • 30144441239 scopus 로고    scopus 로고
    • "Selecive encryption and watermarking of mpeg video"
    • presented at the Int. Conf. Imaging Science, Systems, and Technology, Jun
    • T. Wu and S. Wu, "Selecive encryption and watermarking of mpeg video," presented at the Int. Conf. Imaging Science, Systems, and Technology, Jun. 1997.
    • (1997)
    • Wu, T.1    Wu, S.2
  • 15
    • 11144253373 scopus 로고    scopus 로고
    • "Video fingerprinting and encryption principles for digital rights management"
    • Jun
    • D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management," Proc. IEEE, vol. 92, no. 6, pp. 918-932, Jun. 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 918-932
    • Kundur, D.1    Karthik, K.2
  • 16
    • 0032072279 scopus 로고    scopus 로고
    • "Image adaptive watermarking using visual models"
    • May
    • C. Podilchuk and W. Zeng, "Image adaptive watermarking using visual models," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 525-540, May 1998.
    • (1998) IEEE J. Sel. Areas Commun. , vol.16 , Issue.4 , pp. 525-540
    • Podilchuk, C.1    Zeng, W.2
  • 17
  • 18
    • 0032075477 scopus 로고    scopus 로고
    • "Some general methods for tampering with waterinaking"
    • May
    • I. Cox and J. P. Linnartz, "Some general methods for tampering with waterinaking," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 587-593, May 1998.
    • (1998) IEEE J. Sel. Areas Commun. , vol.16 , Issue.4 , pp. 587-593
    • Cox, I.1    Linnartz, J.P.2
  • 20
    • 0003538515 scopus 로고    scopus 로고
    • "Analysis of attacks on image watermarks with randomized coefficients"
    • NEC Res. Inst., Tech. Rep. 96-045
    • H. Stone, "Analysis of attacks on image watermarks with randomized coefficients," NEC Res. Inst., Tech. Rep. 96-045, 1996.
    • (1996)
    • Stone, H.1
  • 21
    • 0036612847 scopus 로고    scopus 로고
    • "A format-compliant configurable encryption framework for access control of video"
    • Jun
    • J. Wen, M. Severa, W. Zeng, M. Luttrell, and W. Jin, "A format-compliant configurable encryption framework for access control of video," IEEE Trans. Circuits Syst. Video Technol., vol. 12, no. 6, pp. 545-557, Jun.2002.
    • (2002) IEEE Trans. Circuits Syst. Video Technol. , vol.12 , Issue.6 , pp. 545-557
    • Wen, J.1    Severa, M.2    Zeng, W.3    Luttrell, M.4    Jin, W.5
  • 22
    • 84942242681 scopus 로고    scopus 로고
    • "Communication-friendly encryption of multimedia"
    • presented at the IEEE Multimedia Signal Processing Workshop, Dec
    • M. Wu and Y Mao, "Communication-friendly encryption of multimedia," presented at the IEEE Multimedia Signal Processing Workshop, Dec. 2002.
    • (2002)
    • Wu, M.1    Mao, Y.2
  • 25
    • 23044526820 scopus 로고    scopus 로고
    • "Pricing multicast communication: A cost-based approach"
    • J. Chuang and M. Sirbu, "Pricing multicast communication: A cost-based approach," Telecommun. Syst., vol. 17, no. 3, pp. 281-297, 2001.
    • (2001) Telecommun. Syst. , vol.17 , Issue.3 , pp. 281-297
    • Chuang, J.1    Sirbu, M.2
  • 26
    • 84908491832 scopus 로고    scopus 로고
    • "Resistance of orthogonal gaussian fingerprints to collusion attacks"
    • presented at the IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Apr
    • Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. R. Liu, "Resistance of orthogonal gaussian fingerprints to collusion attacks," presented at the IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Apr. 2003.
    • (2003)
    • Wang, Z.J.1    Wu, M.2    Zhao, H.3    Trappe, W.4    Liu, K.J.R.5
  • 27
    • 0035335388 scopus 로고    scopus 로고
    • "Rotation, scale, and translation resilient public watermarking for images"
    • May
    • C. Lin, M. Wu, J. Bloom, M. Miller, I. Cox, and Y Liu, "Rotation, scale, and translation resilient public watermarking for images," IEEE Trans. Image Process., vol. 10, no. 5, pp. 767-782, May 2001.
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.5 , pp. 767-782
    • Lin, C.1    Wu, M.2    Bloom, J.3    Miller, M.4    Cox, I.5    Liu, Y.6
  • 28
    • 0242408710 scopus 로고    scopus 로고
    • "Robust, content-dependent, high-fidelity watermark for tracking in digital cinema"
    • presented at the SPIE Security and Watermarking of Multimedia Contents V
    • J. Lubin, J. Bloom, and H. Cheng, "Robust, content-dependent, high-fidelity watermark for tracking in digital cinema," presented at the SPIE Security and Watermarking of Multimedia Contents V, vol. 5020, 2003.
    • (2003) , vol.5020
    • Lubin, J.1    Bloom, J.2    Cheng, H.3
  • 29
    • 0032072064 scopus 로고    scopus 로고
    • "Watermarking of uncompressed and compressed video"
    • F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Process., vol. 66, no. 3, pp. 283-301, 1998.
    • (1998) Signal Process. , vol.66 , Issue.3 , pp. 283-301
    • Hartung, F.1    Girod, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.