An anonymous watermarking scheme for content distribution protection using trusted computing

被引:0
|
作者
Leung, Adrian [1 ]
Sen Poh, Geong [1 ]
机构
[1] Univ London, Royal Holloway, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
Buyer-Seller Watermarking; Asymmetric Fingerprinting; DRM; Trusted Computing; ubiquitous computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many Content Distribution Protection (CDP) schemes (e.g. Buyer-Seller Watermarking and Asymmetric Fingerprinting) have been proposed to address the problem of illegal distribution of copyrighted content. All of the existing CDP schemes rely on a Trusted Third Party in one way or another to achieve the desired security objectives. In this paper, using the functionalities of Trusted Computing, we present an anonymous CDP watermarking scheme, which minimises the reliance on a Trusted Third Party. Our scheme allows a buyer to anonymously purchase digital content, whilst enabling the content provider to blacklist the buyers that are distributing content illegally.
引用
收藏
页码:319 / 326
页数:8
相关论文
共 50 条
  • [21] Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
    Goi, Bok-Min
    Phan, Raphael C. -W.
    Chuah, Hean-Teik
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 951 - +
  • [22] Research and Security Analysis of Anonymous Identity Authentication in Trusted Computing
    Yang, Yang
    Zhang, Huanguo
    He, Fan
    Zhang, Bo
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 409 - +
  • [24] Efficient certificateless anonymous attestation to trusted cloud computing platforms
    Luo, Dongjun
    International Journal of Advancements in Computing Technology, 2012, 4 (17) : 28 - 37
  • [25] Property-Based Anonymous Attestation in Trusted Cloud Computing
    Ning, Zhen-Hu
    Jiang, Wei
    Zhan, Jing
    Liang, Peng
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2014, 2014
  • [26] Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol
    Lee, Suk-Hwan
    Kwon, Seong-Geun
    Kwon, Ki-Ryong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (02): : 504 - 523
  • [27] A multiple ballots election scheme using anonymous distribution
    Okamoto, Manabu
    TENCON 2010: 2010 IEEE REGION 10 CONFERENCE, 2010, : 1982 - 1985
  • [28] Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme
    Rathee, Geetanjali
    Iqbal, Razi
    Khelifi, Adel
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 2755 - 2769
  • [29] A New Direct Anonymous Attestation Scheme for Trusted NFV System
    CHEN Liquan
    ZHU Zheng
    WANG Yansong
    LU Hua
    CHEN Yang
    ZTE Communications, 2018, 16 (04) : 30 - 37
  • [30] A Fair Anonymous Auction Scheme Utilizing Trusted Hardware and Blockchain
    Enkhtaivan, Batnyam
    Takenouchi, Takao
    Sako, Kazue
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 237 - 241