An anonymous watermarking scheme for content distribution protection using trusted computing

被引:0
|
作者
Leung, Adrian [1 ]
Sen Poh, Geong [1 ]
机构
[1] Univ London, Royal Holloway, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
Buyer-Seller Watermarking; Asymmetric Fingerprinting; DRM; Trusted Computing; ubiquitous computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many Content Distribution Protection (CDP) schemes (e.g. Buyer-Seller Watermarking and Asymmetric Fingerprinting) have been proposed to address the problem of illegal distribution of copyrighted content. All of the existing CDP schemes rely on a Trusted Third Party in one way or another to achieve the desired security objectives. In this paper, using the functionalities of Trusted Computing, we present an anonymous CDP watermarking scheme, which minimises the reliance on a Trusted Third Party. Our scheme allows a buyer to anonymously purchase digital content, whilst enabling the content provider to blacklist the buyers that are distributing content illegally.
引用
收藏
页码:319 / 326
页数:8
相关论文
共 50 条
  • [31] Multi-watermarking Scheme for Copyright Protection and Content Authentication of Digital Audio
    Xu, Tingting
    Shao, Xi
    Yang, Zhen
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2009, 2009, 5879 : 1281 - 1286
  • [32] A new blockchain-based trusted DRM scheme for built-in content protection
    Ma Zhaofeng
    Huang Weihua
    Gao Hongmin
    EURASIP Journal on Image and Video Processing, 2018
  • [33] DRPChain: A new blockchain-based trusted DRM scheme for image content protection
    Yun, Jian
    Liu, Xinyu
    Lu, Yusheng
    Guan, Jingdan
    Liu, Xinyang
    PLOS ONE, 2024, 19 (09):
  • [34] Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol
    Chen, Tzung-Her
    Tsai, Du-Shiau
    PATTERN RECOGNITION, 2006, 39 (08) : 1530 - 1541
  • [35] A new blockchain-based trusted DRM scheme for built-in content protection
    Ma Zhaofeng
    Huang Weihua
    Gao Hongmin
    EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2018,
  • [36] On the Concept of Trusted Computing and Software Watermarking: A Computational Complexity Treatise
    Wu Hao
    Wu Guoqing
    INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 465 - 474
  • [37] Visible watermarking for content protection
    Taylor, A
    Foster, R
    Pelly, J
    SMPTE MOTION IMAGING JOURNAL, 2003, 112 (2-3): : 81 - 89
  • [38] On the implementation of a copyright protection scheme using digital image watermarking
    Subhrajit Sinha Roy
    Abhishek Basu
    Avik Chattopadhyay
    Multimedia Tools and Applications, 2020, 79 : 13125 - 13138
  • [39] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [40] On the implementation of a copyright protection scheme using digital image watermarking
    Roy, Subhrajit Sinha
    Basu, Abhishek
    Chattopadhyay, Avik
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) : 13125 - 13138