Fingerprinting for multimedia content broadcasting system

被引:5
作者
Kuribayashi, Minoru [1 ]
Funabiki, Nobuo [1 ]
机构
[1] Grad Sch Nat Sci & Technol, Kita Ku, 3-1-1 Tsushima Naka, Okayama 7008530, Japan
关键词
Fingerprinting; Asymmetric property; Broadcasting; Time-bound key management; SELLER WATERMARKING PROTOCOL; COLLUSION-RESISTANT; BUYER; CODES; ENCRYPTION; EFFICIENT; SCHEME; BINARY;
D O I
10.1016/j.jisa.2018.06.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We investigated the traceability of illegal users to prevent illegal redistribution of pirated copies by adopting cryptographic and watermarking approaches. The former approach involves controlling the decryption key sequence issued to users, and the latter involves embedding fingerprint information into multimedia content. Since the cryptographic approach identifies illegal users from the decryption key sequence, a decrypted copy is not protected from illegal redistribution. The watermarking approach can trace illegal users if the fingerprint information is correctly extracted from a pirated copy. However, the transaction of legal distribution is one-to-one in conventional systems. In this paper, we propose a broadcast-type fingerprinting system by introducing a time-bound key management scheme based on the assumption that illegal users must financially compensate to the broadcaster for all content distributed during a certain period. In the proposed system, illegal users can be identified from the decryption key sequence issued to users as well as from pirated copies. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:52 / 61
页数:10
相关论文
共 36 条
[1]  
[Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
[2]   Provably-Secure Time-Bound Hierarchical Key Assignment Schemes [J].
Ateniese, Giuseppe ;
De Santis, Alfredo ;
Ferrara, Anna Lisa ;
Masucci, Barbara .
JOURNAL OF CRYPTOLOGY, 2012, 25 (02) :243-270
[3]  
Bao F, 2000, LNCS, V2015, P162
[4]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[5]   An efficient time-bound hierarchical key management scheme for secure broadcasting [J].
Bertino, Elisa ;
Shang, Ning ;
Wagstaff, Samuel S., Jr. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (02) :65-70
[6]   Collusion-secure fingerprinting for digital data [J].
Boneh, D ;
Shaw, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :1897-1905
[7]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[8]  
Charpentier Ana, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P43, DOI 10.1007/978-3-642-24178-9_4
[9]  
Choi JG, 2003, LECT NOTES COMPUT SC, V2846, P265
[10]   Tracing traitors [J].
Chor, B ;
Fiat, A ;
Naor, M ;
Pinkas, B .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) :893-910