Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
The PIM architecture for wide-area multicast routing
IEEE/ACM Transactions on Networking (TON)
Methods for encrypting and decrypting MPEG video data efficiently
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Watermarking of uncompressed and compressed video
Signal Processing
Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
A fast MPEG video encryption algorithm
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Enabling conferencing applications on the internet using an overlay muilticast architecture
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Watercasting: Distributed Watermarking of Multicast Media
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
An Empirical Study of Secure MPEG Video Transmissions
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
An Efficient MPEG Video Encryption Algorithm
SRDS '98 Proceedings of the The 17th IEEE Symposium on Reliable Distributed Systems
On Resolving Rightful Ownership's of Digital Images by Invisible Watermarks
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership
ICMCS '98 Proceedings of the IEEE International Conference on Multimedia Computing and Systems
Optimized Group Rekey for Group Communications Systems
Optimized Group Rekey for Group Communications Systems
Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
Scalable Secure Group Communication over IP Multicast
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
MMSD '96 Proceedings of the 1996 International Workshop on Multimedia Software Development (MMSD '96)
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Watermarking security enhancement using filter parametrization in feature domain
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Watermarking techniques using the Drawing Exchange Format (DXF) file
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Towards robust hidden watermarking using multiple quasi-circles
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
PlataJanus: an audio annotation watermarking framework
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Collusion-secure fingerprinting for digital data
IEEE Transactions on Information Theory
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
Building efficient and effective multimedia fingerprints via joint coding and embedding
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
An group key distribution protocol for secure group communications
ACOS'07 Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6
Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Scalable group key management protocol based on key material transmitting tree
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Secure group key distribution protocol for distributed systems
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Key management for multicast fingerprinting
ICISS'05 Proceedings of the First international conference on Information Systems Security
A legally-admissible copyrights ownership identification protocol for digital works
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service
Hi-index | 0.00 |
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applications that can benefit from using our secure multicast protocol, e.g., the commercial pay-per-view video multicast, or highly secure military intelligence video conference. Our secure multicast protocol is designed to achieve the following goals. (1) It can run in any open network environment. It does not rely on any security mechanism on intermediate network switches or routers. (2) It can be built on top of any existing multicast architecture. (3) Our key distribution protocol is both secure and robust in the presence of long delay or membership message. (4) It can support dynamic group membership, e.g., JOIN/LEAVE/EXPEL operations, in a network bandwidth efficient manner. (5) It can provide copyright protection for the information provider. (6) It can help to identify insiders in the multicast session who are leaking information to the outside world. We have implemented a prototype system which validates our secure multicast protocol and evaluated it against various performance matrices. The experimental results are very encouraging, but also show where new engineering approaches need to be deployed to conform fully to the design goals.