Secure Multimedia Distribution Based on Watermarking and Encryption

Hongyuan Li, Guangjie Liu, Yue-wei Dai, Zhiquan Wang
{"title":"Secure Multimedia Distribution Based on Watermarking and Encryption","authors":"Hongyuan Li, Guangjie Liu, Yue-wei Dai, Zhiquan Wang","doi":"10.4156/JCIT.VOL5.ISSUE9.29","DOIUrl":null,"url":null,"abstract":"Abstract In this paper, a secure content distribution scheme is proposed which transmits the multimedia content to users in a secure manner. In server side, the content is embedded by pseudorandom sequences (the customer’s ID) and then encrypted by another pseudorandom sequence. In user side, the content is decrypted with the some sequence as the encryption process. All the pseudorandom sequences are generated by the chaotic map under the control of secure key. The decrypted content is traceable to trace the illegally redistribution of the pirate. Theoretical and experimental results show that the scheme obtains high security of the encryption, imperceptibility and traceability. Additionally, the embedded watermarks are robustness against collusion attack.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Convergence Inf. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.29","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Abstract In this paper, a secure content distribution scheme is proposed which transmits the multimedia content to users in a secure manner. In server side, the content is embedded by pseudorandom sequences (the customer’s ID) and then encrypted by another pseudorandom sequence. In user side, the content is decrypted with the some sequence as the encryption process. All the pseudorandom sequences are generated by the chaotic map under the control of secure key. The decrypted content is traceable to trace the illegally redistribution of the pirate. Theoretical and experimental results show that the scheme obtains high security of the encryption, imperceptibility and traceability. Additionally, the embedded watermarks are robustness against collusion attack.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于水印和加密的安全多媒体分发
摘要本文提出了一种安全内容分发方案,将多媒体内容以安全的方式传输给用户。在服务器端,内容由伪随机序列(客户的ID)嵌入,然后由另一个伪随机序列加密。在用户端,以某种顺序对内容进行解密作为加密过程。所有伪随机序列都是在安全密钥的控制下由混沌映射生成的。解密后的内容是可追踪的,可以追踪盗版的非法再分发。理论和实验结果表明,该方案具有较高的加密安全性、不可感知性和可追溯性。此外,所嵌入的水印具有抗合谋攻击的鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Research on Maximal Frequent Pattern Outlier Factor for Online High-Dimensional Time-Series Outlier Detection Spirit: Security and Privacy in Real-Time Monitoring System Integrating Product Information Management (PIM) with Internet-Mediated Transactions (IMTs) Area Optimization in Floorplanning Using AP-TCG People Summarization by Combining Named Entity Recognition and Relation Extraction
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1