Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
Watermarking of uncompressed and compressed video
Signal Processing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Chameleon - A New Kind of Stream Cipher
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Scrambling and Key Distribution Scheme for Digital Television
ICON '01 Proceedings of the 9th IEEE International Conference on Networks
Short Signatures from the Weil Pairing
Journal of Cryptology
Modeling and implementation of digital rights
Journal of Systems and Software
On Secure and Anonymous Buyer-Seller Watermarking Protocol
ICIW '08 Proceedings of the 2008 Third International Conference on Internet and Web Applications and Services
Buyer-seller watermarking protocols with off-line trusted third parties
International Journal of Ad Hoc and Ubiquitous Computing
Secure multimedia content delivery with multiparty multilevel DRM architecture
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
Privacy preserving multiparty multilevel DRM architecture
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
An anonymous buyer-seller watermarking protocol with anonymity control
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring
IH'04 Proceedings of the 6th international conference on Information Hiding
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks
IEEE Transactions on Information Forensics and Security
A Buyer–Seller Watermarking Protocol Based on Secure Embedding
IEEE Transactions on Information Forensics and Security
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Ontologies for intellectual property rights protection
Expert Systems with Applications: An International Journal
Robust watermarking of compressed JPEG images in encrypted domain
Transactions on data hiding and multimedia security VI
A novel JFE scheme for social multimedia distribution in compressed domain using SVD and CA
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.01 |
Multiparty multilevel digital rights management (DRM) architecture involving several levels of distributors in between an owner and a consumer has been suggested as an alternative business model to the traditional two-party (buyer-seller) DRM architecture for digital content delivery. In the two-party DRM architecture, cryptographic techniques are used for secure delivery of the content, and watermarking techniques are used for protecting the rights of the seller and the buyer. The cryptographic protocols used in the two-party case for secure content delivery can be directly applied to the multiparty multilevel case. However, the watermarking protocols used in the two-party case may not directly carry over to the multiparty multilevel case, as it needs to address the simultaneous security concerns of multiple parties such as the owner, multiple levels of distributors, and consumers. Towards this, in this paper, we propose a joint digital watermarking scheme using Chinese remainder theorem for the multiparty multilevel DRM architecture. In the proposed scheme, watermark information is jointly created by all the parties involved; then a watermark signal is generated out of it and embedded into the content. This scheme takes care of the security concerns of all parties involved. Further, in the event of finding an illegal copy of the content, the violator(s) can be traced back.