메뉴 건너뛰기




Volumn 32, Issue 2, 2002, Pages 42-60

A secure multicast protocol with copyright protection

Author keywords

Copyright protection; Key distribution; Multicast security; Watermark

Indexed keywords

COPYRIGHTS; MULTIMEDIA SYSTEMS; NETWORK PROTOCOLS; ROUTERS; VIDEO CONFERENCING; WATERMARKING;

EID: 4544310181     PISSN: 01464833     EISSN: 01464833     Source Type: Conference Proceeding    
DOI: 10.1145/568567.568570     Document Type: Article
Times cited : (60)

References (57)
  • 1
    • 33645762883 scopus 로고    scopus 로고
    • Msec working group. Available via http://www.securemulticast.org/msec- index.htm.
  • 2
    • 33645769910 scopus 로고    scopus 로고
    • The secure multicast research group. Available via http://www. securemulticast.org/smug-drafts.htm.
  • 4
    • 18944405526 scopus 로고    scopus 로고
    • Key management for large dynamic groups: One-way function trees and amortized initialization
    • August
    • D. Balenson, D. McGrew, and A. Sherman. Key management for large dynamic groups: One-way function trees and amortized initialization. Ietf draft, August 2000.
    • (2000) Ietf Draft
    • Balenson, D.1    McGrew, D.2    Sherman, A.3
  • 5
    • 0003466087 scopus 로고    scopus 로고
    • Scalable multicast key distribution
    • May
    • A. Ballardie. Scalable multicast key distribution. Rfc1949, May 1996.
    • (1996) Rfc1949
    • Ballardie, A.1
  • 6
    • 0003205525 scopus 로고    scopus 로고
    • Core based trees (CBT) multicast architecture
    • September
    • A. Ballardie. Core based trees (CBT) multicast architecture. Rfc2201, September 1997.
    • (1997) Rfc2201
    • Ballardie, A.1
  • 8
    • 33645769152 scopus 로고    scopus 로고
    • Robust watermarking of still images for copyright protection
    • January
    • M. Barni, F. Bartolini, V. Cappellini, and A. Piva. Robust watermarking of still images for copyright protection. In SPIE Proceedings '99, volume 3657, pages 46-47, January 1999.
    • (1999) SPIE Proceedings '99 , vol.3657 , pp. 46-47
    • Barni, M.1    Bartolini, F.2    Cappellini, V.3    Piva, A.4
  • 10
    • 84947942283 scopus 로고
    • Fingerprinting long forgiving messages
    • Advances in Cryptology, Proceedings of CRYPTO '85, Springer-Verlag
    • G. R. Blakley, C. Meadows, and G. B. Purdy. Fingerprinting long forgiving messages. In Advances in Cryptology, Proceedings of CRYPTO '85, vol. 218 of Lecture Notes in Computer Science, pages 180-189. Springer-Verlag, 1986.
    • (1986) Lecture Notes in Computer Science , vol.218 , pp. 180-189
    • Blakley, G.R.1    Meadows, C.2    Purdy, G.B.3
  • 11
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • September
    • D. Boneh and J. Show. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5):1897-1905, September 1998.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Show, J.2
  • 12
    • 0028592391 scopus 로고
    • Electronic marking and identification techniques to discourage document copying
    • Toronto, June
    • J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman. Electronic marking and identification techniques to discourage document copying. In Proceedings of IEEE INFOCOM'94, volume 3, pages 1278-1287, Toronto, June 1994.
    • (1994) Proceedings of IEEE INFOCOM'94 , vol.3 , pp. 1278-1287
    • Brassil, J.1    Low, S.2    Maxemchuk, N.3    O'Gorman, L.4
  • 16
    • 0002152920 scopus 로고
    • Assuring ownership rights for digital images
    • Vieweg Publishing Company
    • G. Caronni. Assuring Ownership Rights for Digital Images. In Proceedings of Reliable IT Systems, VIS'95. Vieweg Publishing Company, 1995.
    • (1995) Proceedings of Reliable IT Systems, VIS'95
    • Caronni, G.1
  • 19
    • 84985922619 scopus 로고
    • Tracing traitors
    • Advances in Cryptology, Proceedings of CRYPTO '94, Springer-Verlag
    • B. A. Chor, A. Fiat, and M. Naor. Tracing traitors. In Advances in Cryptology, Proceedings of CRYPTO '94, vol. 839 of Lecture Notes in Computer Science, pages 257-270. Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 257-270
    • Chor, B.A.1    Fiat, A.2    Naor, M.3
  • 21
    • 0003047061 scopus 로고    scopus 로고
    • Enabling conferencing applications on the internet using an overlay multicast architecture
    • San Diego, CA, August
    • Y. Chu, S. Rao, S. Seshan, and H. Zhang. Enabling conferencing applications on the internet using an overlay multicast architecture. In Proceedings of ACM SIGCOMM'01, San Diego, CA, August 2001.
    • (2001) Proceedings of ACM SIGCOMM'01
    • Chu, Y.1    Rao, S.2    Seshan, S.3    Zhang, H.4
  • 26
    • 0003460574 scopus 로고    scopus 로고
    • Group Key Management Protocol (GKMP) architecture
    • July
    • H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Architecture. Rfc2094, July 1997.
    • (1997) Rfc2094
    • Harney, H.1    Muckenhirn, C.2
  • 27
    • 0003285503 scopus 로고    scopus 로고
    • Group Key Management Protocol (GKMP) specification
    • July
    • H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Specification. Rfc2093, July 1997.
    • (1997) Rfc2093
    • Harney, H.1    Muckenhirn, C.2
  • 29
    • 10044241476 scopus 로고    scopus 로고
    • Whim: Watermarking multicast video with a hierarchy of intermediaries
    • Chapel Hill, NC, June
    • P. Judge and M. Ammar. Whim: Watermarking multicast video with a hierarchy of intermediaries. In Proceedings of NOSSDAV2000, Chapel Hill, NC, June 2000.
    • (2000) Proceedings of NOSSDAV2000
    • Judge, P.1    Ammar, M.2
  • 30
    • 0034787268 scopus 로고    scopus 로고
    • Watermarking techniques using the drawing exchange format (dxf) file
    • Ottawa, Canada, October
    • H. Kang, K. Kim, and S. Han. Watermarking techniques using the drawing exchange format (dxf) file. In Proceeding of ACM Multimedia 2001 Workshops, Ottawa, Canada, October 2001.
    • (2001) Proceeding of ACM Multimedia 2001 Workshops
    • Kang, H.1    Kim, K.2    Han, S.3
  • 35
    • 0000961370 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • Cannes, France, September
    • S. Mittra. Iolus: A Framework for Scalable Secure Multicasting. In Proceedings of ACM SIGCOMM '97, Cannes, France, September 1997.
    • (1997) Proceedings of ACM SIGCOMM '97
    • Mittra, S.1
  • 39
    • 0031638115 scopus 로고    scopus 로고
    • Watermarking method for MPEG encoded video: Towards resolving rightful ownership
    • Austin, Texas, June
    • L. Qiao and K. Nahrstedt. Watermarking Method for MPEG Encoded Video: Towards Resolving Rightful Ownership. In IEEE Multimedia Computing and Systems, Austin, Texas, June 1998.
    • (1998) IEEE Multimedia Computing and Systems
    • Qiao, L.1    Nahrstedt, K.2
  • 41
    • 0345427592 scopus 로고    scopus 로고
    • Optimized group rekey for group communication systems
    • Hebrew University
    • O. Rodeh, K. Birman, and D. Dolev. Optimized group rekey for group communication systems. Technical report, Hebrew University, 1999.
    • (1999) Technical Report
    • Rodeh, O.1    Birman, K.2    Dolev, D.3
  • 49
    • 0034787367 scopus 로고    scopus 로고
    • Watermarking security enhancement using filter parameterization in feature domain
    • Ottawa, Canada, October
    • M. A. Suhail and M. M. Dawoud. Watermarking security enhancement using filter parameterization in feature domain. In Proceeding of ACM Multimedia 2001 Workshops, Ottawa, Canada, October 2001.
    • (2001) Proceeding of ACM Multimedia 2001 Workshops
    • Suhail, M.A.1    Dawoud, M.M.2
  • 54
    • 0003311671 scopus 로고
    • Distance vector multicast routing protocol
    • November
    • D. Waitzman, S. Deering, and C. Partridge. Distance Vector Multicast Routing Protocol. Rfc1075, November 1988.
    • (1988) Rfc1075
    • Waitzman, D.1    Deering, S.2    Partridge, C.3
  • 56
    • 0003978251 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architectures
    • June
    • D. Wallner, E. Harder, and R. Agee. Key Management for Multicast: Issues and Architectures. Rfc2627, June 1999.
    • (1999) Rfc2627
    • Wallner, D.1    Harder, E.2    Agee, R.3
  • 57
    • 0031385945 scopus 로고    scopus 로고
    • On resolving rightful ownships of digital images by invisible watermarks
    • Santa Barbara, CA, October
    • W. Zeng and B. Liu. On resolving rightful ownships of digital images by invisible watermarks. In IEEE International Conference on Image Processing, volume 1, pages 552-555, Santa Barbara, CA, October 1997.
    • (1997) IEEE International Conference on Image Processing , vol.1 , pp. 552-555
    • Zeng, W.1    Liu, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.