메뉴 건너뛰기




Volumn 4, Issue 2, 2010, Pages 152-163

Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer

Author keywords

Asymmetric fingerprinting; Digital copyright protection; Information security; Multicast; Oblivious transfer; Secure multimedia distribution; Traitor tracing

Indexed keywords

BANDWIDTH; MULTICASTING; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 77955954793     PISSN: 17441765     EISSN: 17441773     Source Type: Journal    
DOI: 10.1504/IJICS.2010.034815     Document Type: Article
Times cited : (15)

References (19)
  • 2
    • 0037399342 scopus 로고    scopus 로고
    • Digital fingerprinting codes: Problem statements, constructions, identification of traitors
    • Barg, A., Blakley, G.R. and Kabatiansky, G. (2003) 'Digital fingerprinting codes: problem statements, constructions, identification of traitors', IEEE Trans. Inform. Theory, Vol. 49, No. 4, pp.852-865.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.4 , pp. 852-865
    • Barg, A.1    Blakley, G.R.2    Kabatiansky, G.3
  • 3
    • 0036028058 scopus 로고    scopus 로고
    • Cryptographic methods for collusion-secure fingerprinting of digital data
    • Biehl, I. and Meyer, B. (2002) 'Cryptographic methods for collusion-secure fingerprinting of digital data', Computers and Electrical Engineering, Vol. 28, No. 1, pp.59-75.
    • (2002) Computers and Electrical Engineering , vol.28 , Issue.1 , pp. 59-75
    • Biehl, I.1    Meyer, B.2
  • 4
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Boneh, D. and Shaw, J. (1998) 'Collusion-secure fingerprinting for digital data', IEEE Trans. Inform. Theory, Vol. 44, No. 5, pp.1897-1905.
    • (1998) IEEE Trans. Inform. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 5
    • 0032712929 scopus 로고    scopus 로고
    • PKI, elliptic curve cryptography and digital signatures
    • Caelli, W.J. et al. (1999) 'PKI, elliptic curve cryptography and digital signatures', Computers & Security, Vol. 18, No. 1, pp.47-66.
    • (1999) Computers & Security , vol.18 , Issue.1 , pp. 47-66
    • Caelli, W.J.1
  • 6
    • 49549083913 scopus 로고    scopus 로고
    • Lookup-table-based secure client-side embedding for spread-spectrum watermarks
    • Celik, M. et al .(2008) 'Lookup-table-based secure client-side embedding for spread-spectrum watermarks', IEEE Trans. Inform. Theory, Vol. 3, No. 3, pp.475-487.
    • (2008) IEEE Trans. Inform. Theory , vol.3 , Issue.3 , pp. 475-487
    • Celik, M.1
  • 7
    • 0035009221 scopus 로고    scopus 로고
    • Modeling the branching characteristics and efficiency gains in global multicast trees
    • Chalmers, R.C. and Almeroth, K.C. (2001) 'Modeling the branching characteristics and efficiency gains in global multicast trees', InfoCom 2001, pp.449-458.
    • (2001) InfoCom , vol.2001 , pp. 449-458
    • Chalmers, R.C.1    Almeroth, K.C.2
  • 8
    • 33646177190 scopus 로고    scopus 로고
    • Fast elliptic curve point multiplication using doublebase chains
    • Report 2005/069
    • Dimitrov, V.S. (2005) 'Fast elliptic curve point multiplication using doublebase chains', Cryptology ePrint Archive, Report 2005/069.
    • (2005) Cryptology ePrint Archive
    • Dimitrov, V.S.1
  • 9
    • 11144253373 scopus 로고    scopus 로고
    • Video fingerprinting and encryption principles for digital rights management
    • Kundur, D. (2004) 'Video fingerprinting and encryption principles for digital rights management', Proceedings of the IEEE, Vol. 92, No. 6, pp.918-932.
    • (2004) Proceedings of the IEEE , vol.92 , Issue.6 , pp. 918-932
    • Kundur, D.1
  • 10
    • 28844473947 scopus 로고    scopus 로고
    • Fingerprinting protocol for images based on additive homomorphic property
    • Kuribayashi, M. and Tanaka, H. (2005) 'Fingerprinting protocol for images based on additive homomorphic property', IEEE Transactions on Image Processing, Vol. 14, No. 12, pp.2129-2139.
    • (2005) IEEE Transactions on Image Processing , vol.14 , Issue.12 , pp. 2129-2139
    • Kuribayashi, M.1    Tanaka, H.2
  • 15
    • 37649018591 scopus 로고    scopus 로고
    • Anonymous fingerprinting with robust QIM watermarking techniques
    • Prins, J.P., Erkin, Z. and Lagendijk, R.L. (2007) 'Anonymous fingerprinting with robust QIM watermarking techniques', EURASIP J. Inform. Security, Vol. 2007, No. 8, pp.1-7.
    • (2007) EURASIP J. Inform. Security , vol.2007 , Issue.8 , pp. 1-7
    • Prins, J.P.1    Erkin, Z.2    Lagendijk, R.L.3
  • 16
    • 0003462641 scopus 로고
    • Technical Report TR-81, Aitken Computation Laboratory Harvard University
    • Rabin, M. (1981) 'How to exchange secrets by oblivious transfer', Technical Report TR-81, Aitken Computation Laboratory, Harvard University.
    • (1981) How to Exchange Secrets by Oblivious Transfer
    • Rabin, M.1
  • 18
    • 43949123848 scopus 로고    scopus 로고
    • Optimal probabilistic fingerprint codes
    • Tardos, G. (2008) 'Optimal probabilistic fingerprint codes', Journal of the ACM (JACM), Vol. 55, No. 2, pp.1-24.
    • (2008) Journal of the ACM (JACM) , vol.55 , Issue.2 , pp. 1-24
    • Tardos, G.1
  • 19
    • 0038527384 scopus 로고    scopus 로고
    • Anti-collusion fingerprinting for multimedia
    • Trappe, W. et al. (2003) 'Anti-collusion fingerprinting for multimedia', IEEE Trans. Signal Process, Vol. 51, No. 4, pp.1069-1087.
    • (2003) IEEE Trans. Signal Process , vol.51 , Issue.4 , pp. 1069-1087
    • Trappe, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.