An anonymous watermarking scheme for content distribution protection using trusted computing

被引:0
|
作者
Leung, Adrian [1 ]
Sen Poh, Geong [1 ]
机构
[1] Univ London, Royal Holloway, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
Buyer-Seller Watermarking; Asymmetric Fingerprinting; DRM; Trusted Computing; ubiquitous computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many Content Distribution Protection (CDP) schemes (e.g. Buyer-Seller Watermarking and Asymmetric Fingerprinting) have been proposed to address the problem of illegal distribution of copyrighted content. All of the existing CDP schemes rely on a Trusted Third Party in one way or another to achieve the desired security objectives. In this paper, using the functionalities of Trusted Computing, we present an anonymous CDP watermarking scheme, which minimises the reliance on a Trusted Third Party. Our scheme allows a buyer to anonymously purchase digital content, whilst enabling the content provider to blacklist the buyers that are distributing content illegally.
引用
收藏
页码:319 / 326
页数:8
相关论文
共 50 条
  • [1] Direct anonymous authentication scheme for wireless networks under trusted computing
    Yang, Li
    Ma, Jian-Feng
    Pei, Qing-Qi
    Ma, Zhuo
    [J]. Tongxin Xuebao/Journal on Communications, 2010, 31 (08): : 98 - 104
  • [2] Anonymous RFID Authentication Using Trusted Computing Technologies
    Dietrich, Kurt
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 91 - 102
  • [3] Content Protection based on Trusted computing in Mobile Terminal
    Liu Ren
    Niu Dongxiao
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 192 - 195
  • [4] An efficient anonymous remote attestation scheme for trusted computing based on improved CPK
    Yu Fajiang
    Chen Jing
    Xiang Yang
    Zhu Jiacheng
    Zhao Yangdi
    [J]. Electronic Commerce Research, 2019, 19 : 689 - 718
  • [5] An efficient anonymous remote attestation scheme for trusted computing based on improved CPK
    Yu Fajiang
    Chen Jing
    Xiang Yang
    Zhu Jiacheng
    Zhao Yangdi
    [J]. ELECTRONIC COMMERCE RESEARCH, 2019, 19 (03) : 689 - 718
  • [6] Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters
    Zhao, Jia
    Liu, Jiqiang
    Qin, Zhan
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) : 3313 - 3320
  • [7] The connection anonymous scheme of trusted network
    Zhuang, Jun-Xi
    Gong, Bei
    [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 597 - 600
  • [8] A robust digital image watermarking scheme for content protection
    Mei, Xu-Shi
    Chen, Huan-Tong
    Fan, Hang-Yu
    Lu, Zhe-Ming
    Yeh, Jyh-Haw
    [J]. Journal of Network Intelligence, 2020, 5 (02): : 54 - 61
  • [9] AN ANONYMOUS REMOTE ATTESTATION FOR TRUSTED CLOUD COMPUTING
    Zhang, Yong
    Li, Xiangxue
    Qian, Haifeng
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 426 - 429
  • [10] A remote anonymous attestation protocol in trusted computing
    Liu, Jiqiang
    Zhao, Jia
    Han, Zhen
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-8, 2008, : 3688 - 3693