A scrambling method based on disturbance of motion vector
Proceedings of the tenth ACM international conference on Multimedia
An efficient secure communication between set-top box and smart card in DTV broadcasting
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A CRT based watermark for multiparty multilevel DRM architecture
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Joint watermarking scheme for multiparty multilevel DRM architecture
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
On the existence of related-key oracles in cryptosystems based on block ciphers
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Secure interoperable digital content distribution mechanisms in a multi-domain architecture
Multimedia Tools and Applications
Secure communication in IPTV broadcasting
The Journal of Supercomputing
Hi-index | 0.00 |
The scrambling scheme is a part of the conditionalaccess system (CAS) that is used to prevent unauthorizedaccess to Pay-TV systems. In this paper, we propose anew scrambling scheme and key distribution scheme. Thescrambling scheme is used in conjunction with ordinaryencryption techniques, for protecting the digital videostreams from unauthorized viewing. A hash function anda pseudo-random number generator are used to preparethe video stream before being encrypted. The proposedscheme helps reduce computational time and complexitywhile providing the same level of security as encryptingthe entire video stream. In addition, the proposed securekey distribution scheme can be used with any scramblingscheme e.g. with our scrambling scheme. By using theChinese Remainder Theorem (CRT) for distributingparameters in the scrambling process, the security of thescheme can be increased. Moreover, our scheme canprevent two common problems, namely smart cardcloning and McCormac Hack.