Filters








4 Hits in 2.0 sec

Secure multimedia content delivery with multiparty multilevel DRM architecture

Tony Thomas, Sabu Emmanuel, Amitabha Das, Mohan S. Kankanhalli
2009 Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video - NOSSDAV '09  
In this paper, we propose a mechanism which takes care of the above security issues, for delivering multimedia content through multiparty multilevel DRM architecture.  ...  In a multiparty multilevel DRM architecture the cryptographic and watermarking mechanism need to ensure the secure delivery of the content as well as the security concerns of the owner, multiple levels  ...  CONCLUSION In this paper, we presented a mechanism for securely delivering multimedia content through a multiparty multilevel DRM architecture using a joint watermarking mechanism combined with cryptographic  ... 
doi:10.1145/1542245.1542265 dblp:conf/nossdav/ThomasEDK09 fatcat:aq35haps3jdvjmiubin4idktam

A CRT based watermark for multiparty multilevel DRM architecture

Tony Thomas, Sabu Emmanuel, Amitabha Das, Mohan S. Kankanhalli
2009 2009 IEEE International Conference on Multimedia and Expo  
In this paper, we propose a joint digital watermarking protocol for the multiparty multilevel DRM architecture using Garner's algorithm for the Chinese remainder theorem (CRT).  ...  The proposed joint watermarking protocol embeds a single watermark signal into the content while taking care of the various security concerns such as proof of involvement in the distribution chain, nonrepudiation  ...  Hence, multiparty multilevel digital rights management architecture (MPML-DRM-A) has been suggested as an alternative to the traditional two party (buyerseller) DRM architecture by many authors [2, 7]  ... 
doi:10.1109/icme.2009.5202668 dblp:conf/icmcs/ThomasEDK09 fatcat:ma7xpnryiradtirbulowuszfbe

Special Issue: Multimedia Information System Security

Shiguo Lian, Dimitris Kanellopoulos, Giancarlo Ruffo, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Editorial Board, Juan Carlos, Augusto, Argentina (+29 others)
2009 unpublished
Acknowledgement This work was supported by the Slovenian Research Agency (ARRS), development project M2-0210 (C) entitled "AvID: Audiovisual speaker identification and emotion detection for secure communications  ...  As such, DRM extends beyond the physical delivery of content into managing the content lifecycle.  ...  General architecture The general architecture of a DRM system is shown in Figure 2 . It is composed of 4 main components: Content Encoder, Content Server, Rights Issuer and User.  ... 
fatcat:ekua3zeo5rfnvcycdaxfmhjihq

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+91 others)
2017 International Journal of Network Security   unpublished
Accordingly, we propose an enhanced scheme to remedy these security weaknesses, and prove that our scheme is more secure and efficient for network application with several positive properties.  ...  Recently, Li et al. pointed out some security weaknesses in Chen et al.'  ...  In order to solve these problems, Muller et al. proposed a new DRM architecture which limits the digital content access to a subset of users who possess certain properties assigned during the encryption  ... 
fatcat:nev5sh4gw5c45hffrl3qmchnzi