메뉴 건너뛰기




Volumn 83, Issue 10, 2010, Pages 1689-1700

A novel DRM framework for peer-to-peer music content delivery

Author keywords

Content delivery; Data hiding; DRM; Fingerprint; P2P; RSA

Indexed keywords

CONTENT DELIVERY; DATA HIDING; DRM; FINGERPRINT; P2P; RSA;

EID: 77956056662     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2010.04.071     Document Type: Article
Times cited : (13)

References (56)
  • 2
    • 77956063292 scopus 로고    scopus 로고
    • Akamai, 2008. http://www.akamai.com.
    • (2008)
  • 7
    • 8344288340 scopus 로고    scopus 로고
    • Incentives build robustness in bittorrent
    • Berkeley, CA
    • B. Cohen Incentives build robustness in bittorrent P2P Economics Workshop Berkeley, CA 2003
    • (2003) P2P Economics Workshop
    • Cohen, B.1
  • 12
    • 77956056720 scopus 로고    scopus 로고
    • P. Fabien MP3Stego 2004 http://www.petitcolas.net/fabien/steganography/ mp3steg
    • (2004) MP3Stego
    • Fabien, P.1
  • 15
    • 33749506982 scopus 로고    scopus 로고
    • Multimedia selective encryption by means of randomized arithmetic coding
    • M. Grangetto, E. Magli, and G. Olmo Multimedia selective encryption by means of randomized arithmetic coding IEEE Transactions on Multimedia 8 5 2006 905 917
    • (2006) IEEE Transactions on Multimedia , vol.8 , Issue.5 , pp. 905-917
    • Grangetto, M.1    Magli, E.2    Olmo, G.3
  • 17
    • 77956062746 scopus 로고    scopus 로고
    • ITunes Plus DRM-free tracks expanding, dropping to 99 cents
    • iTunes Plus DRM-free tracks expanding, dropping to 99 cents Apple News from ARS Technica 2007
    • (2007) Apple News from ARS Technica
  • 20
    • 11144253373 scopus 로고    scopus 로고
    • Video fingerprinting and encryption principles for digital rights management
    • D. Kundur, and K. Karthik Video fingerprinting and encryption principles for digital rights management Proceedings of the IEEE, vol.92, no. 6 2004 918 932
    • (2004) Proceedings of the IEEE, vol.92, No. 6 , pp. 918-932
    • Kundur, D.1    Karthik, K.2
  • 23
    • 0037096996 scopus 로고    scopus 로고
    • A public verifiable copy protection technique for still images
    • Lee, Wei-Bin, Chen, and Tung-Her A public verifiable copy protection technique for still images Journal of Systems and Software 62 3 2002 195 204
    • (2002) Journal of Systems and Software , vol.62 , Issue.3 , pp. 195-204
    • Lee1    Wei-Bin2    Chen3    Tung-Her4
  • 25
    • 33847643270 scopus 로고    scopus 로고
    • Security problems with improper implementations of improved FEA-M
    • Li, Shujun, and K. Lo Security problems with improper implementations of improved FEA-M Journal of Systems and Software 80 5 2007 791 794
    • (2007) Journal of Systems and Software , vol.80 , Issue.5 , pp. 791-794
    • Li1    Shujun2    Lo, K.3
  • 26
    • 64849113652 scopus 로고    scopus 로고
    • An improved lossless data hiding scheme based on image VQ-index residual value coding
    • Z. Lu, J. Wang, and B. Liu An improved lossless data hiding scheme based on image VQ-index residual value coding Journal of Systems and Software 82 6 2009 1016 1024
    • (2009) Journal of Systems and Software , vol.82 , Issue.6 , pp. 1016-1024
    • Lu, Z.1    Wang, J.2    Liu, B.3
  • 27
    • 22144450367 scopus 로고    scopus 로고
    • New paradigms for effective multicasting and fingerprinting of entertainment media
    • W. Luh, and D. Kundur New paradigms for effective multicasting and fingerprinting of entertainment media IEEE Communications Magazine 2005 77 84
    • (2005) IEEE Communications Magazine , pp. 77-84
    • Luh, W.1    Kundur, D.2
  • 28
    • 8844263220 scopus 로고    scopus 로고
    • Benchmarking of image watermarking algorithms for digital rights management
    • B. Macq, J. Dittmann, and E.J. Delp Benchmarking of image watermarking algorithms for digital rights management Proceedings of the IEEE 2004
    • (2004) Proceedings of the IEEE
    • MacQ, B.1    Dittmann, J.2    Delp, E.J.3
  • 29
  • 32
    • 0041848575 scopus 로고    scopus 로고
    • Preventing piracy, reverse engineering, and tampering
    • G. Naumovich, and N. Memon Preventing piracy, reverse engineering, and tampering IEEE Computer Society 36 2003 64 71
    • (2003) IEEE Computer Society , vol.36 , pp. 64-71
    • Naumovich, G.1    Memon, N.2
  • 35
    • 8744220052 scopus 로고    scopus 로고
    • Experimental Computer Systems Lab, Department of Computer Science, State University of New York Stony Brook
    • G. Peng CDN: Content Distribution Network. Technical Report TR-125 2003 Experimental Computer Systems Lab, Department of Computer Science, State University of New York Stony Brook
    • (2003) CDN: Content Distribution Network. Technical Report TR-125
    • Peng, G.1
  • 39
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L.A. Adleman A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM 21 2 1978
    • (1978) Communications of the ACM , vol.21 , Issue.2
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.A.3
  • 40
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir How to share a secret Communications of the ACM 22 1 1979 612 613
    • (1979) Communications of the ACM , vol.22 , Issue.1 , pp. 612-613
    • Shamir, A.1
  • 41
    • 33746445539 scopus 로고    scopus 로고
    • Digital rights management
    • S. Subramanya, and B. Yi Digital rights management Potentials, IEEE 25 2006 31 34
    • (2006) Potentials, IEEE , vol.25 , pp. 31-34
    • Subramanya, S.1    Yi, B.2
  • 50
    • 0036474718 scopus 로고    scopus 로고
    • A wavelet-based watermarking algorithm for ownership verification of digital images
    • Y. Wang, J.F. Doherty, and R.E. Van-Dyck A wavelet-based watermarking algorithm for ownership verification of digital images IEEE Transactions on Image Processing 11 2 2002 77 88
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.2 , pp. 77-88
    • Wang, Y.1    Doherty, J.F.2    Van-Dyck, R.E.3
  • 52
    • 26844567623 scopus 로고    scopus 로고
    • Design of integrated multimedia compression and encryption systems
    • C. -P Wu, and C. Kuo Design of integrated multimedia compression and encryption systems IEEE Transactions on Multimedia 7 2005 828 839
    • (2005) IEEE Transactions on Multimedia , vol.7 , pp. 828-839
    • C, -P.W.1    Kuo, C.2
  • 54
    • 15844424554 scopus 로고    scopus 로고
    • Efficiently self-synchronized audio watermarking for as sured audio data transmission
    • S. Wu, J. Huang, D. Huang, and Y. Shi Efficiently self-synchronized audio watermarking for as sured audio data transmission IEEE Transactions on Broadcasting 51 2005 69 76
    • (2005) IEEE Transactions on Broadcasting , vol.51 , pp. 69-76
    • Wu, S.1    Huang, J.2    Huang, D.3    Shi, Y.4
  • 55
    • 30144435965 scopus 로고    scopus 로고
    • Enhancing data authenticity and integrity in P2P systems
    • X. Zhang, S. Chen, and R. Sandhu Enhancing data authenticity and integrity in P2P systems IEEE Internet Computing 2005 42 49
    • (2005) IEEE Internet Computing , pp. 42-49
    • Zhang, X.1    Chen, S.2    Sandhu, R.3
  • 56
    • 63049127442 scopus 로고    scopus 로고
    • Collision Attacks with Budget Constraints on Key Management Schemes for Secure Multimedia Multicast
    • W. Zhu Collision Attacks with Budget Constraints on Key Management Schemes for Secure Multimedia Multicast IEEE Transactions on Multimedia 11 3 2009
    • (2009) IEEE Transactions on Multimedia , vol.11 , Issue.3
    • Zhu, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.