Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
IEEE Internet Computing
A public verifiable copy protection technique for still images
Journal of Systems and Software
Data Embedding in Scrambled Digital Video
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
A secure and reliable bootstrap architecture
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Enhancing Data Authenticity and Integrity in P2P Systems
IEEE Internet Computing
Security problems with improper implementations of improved FEA-M
Journal of Systems and Software
Open DRM and the Future of Media
IEEE MultiMedia
Audio Watermarking for DRM Based on Chaotic Map
ICCET '09 Proceedings of the 2009 International Conference on Computer Engineering and Technology - Volume 01
An improved lossless data hiding scheme based on image VQ-index residual value coding
Journal of Systems and Software
Collision attacks with budget constraints on key management schemes for secure multimedia multicast
IEEE Transactions on Multimedia - Special section on communities and media computing
A peer-to-peer architecture for live streaming with DRM
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Design of integrated multimedia compression and encryption systems
IEEE Transactions on Multimedia
Multimedia Selective Encryption by Means of Randomized Arithmetic Coding
IEEE Transactions on Multimedia
New paradigms for effective multicasting and fingerprinting of entertainment media
IEEE Communications Magazine
A wavelet-based watermarking algorithm for ownership verification of digital images
IEEE Transactions on Image Processing
Fingerprinting protocol for images based on additive homomorphic property
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Due to rapid advances in the network communications field in recent years, the distribution of large-scale music contents has become easier and more efficient than ever before. However, the unauthorized distribution of copyright-protected content has emerged as a major concern. Accordingly, this paper presents a content distribution framework with a DRM capability for P2P networks. The robustness of the content distribution is ensured by using a network coding approach based on the Lagrange polynomial interpolation method. When the downloading peer within the network receives sufficient coded pieces, it not only reconstructs the associated blocks using a finite field Gaussian elimination method, but also creates its own copies of the coded pieces within these blocks and shares these copies amongst the other peers in the network. As a result, the distribution overhead imposed on the music provider is substantially reduced and the number of coded pieces within the network is significantly increased, thereby overcoming the ''last piece problem'' inherent in existing P2P schemes. In the DRM module of the framework, the RSA public-key cryptosystem is used to generate a unique digital fingerprint for every user within the network. The fingerprint is embedded within the music file in a protected form such that the music provider can establish the identification of any user performing an unauthorized distribution of the file. The experimental results confirm that the proposed framework provides an efficient and secure means of distributing large-scale copyright-protected music contents with no discernible degradation in the audio quality.