9
Views
1
CrossRef citations to date
0
Altmetric
Articles

Secure image distribution based on joint decryption and fingerprinting

Pages 84-93 | Published online: 18 Jul 2013

REFERENCES

  • Lin, E. I., Eskicioglu, A. M., Lagendijk, R. L. and Delp, E. J. Advances in digital video content protection. Proc. IEEE, 2005, 93, 171–183.
  • Lee, W.-B., Chen, T.-H. and Lee, C.-C. Security of new encryption algorithm for image cryptosystems. Imag. Sci. J., 2006, 54, 178–187.
  • Cox, I. J., Miller, M. L. and Bloom, J. A. Digital Watermarking, 2002 (Morgan-Kaufmann, San Francisco).
  • Chang, M.-C., Lou, D.-C. and Tso, H.-K. Combined watermarking and fingerprinting technologies for digital image copyright protection. Imag. Sci. J., 2007, 55, 3–12.
  • Kundur, D. and Karthik, K. Video fingerprinting and encryption principles for digital rights management. Proc. IEEE, 2004, 92, 918–932.
  • Lian, S., Liu, Z., Ren, Z. and Wang, H. Commutative encryption and watermarking in compressed video data. IEEE Circuits Sys. Video Technol., 2007, 17, 774–778.
  • Boneh, D. and Shaw, J. Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory, 1998, 44, 1897–1905.
  • Wu, M., Trappe, W., Wang, Z. J. and Liu, R. Collusion-resistant fingerprinting for multimedia. IEEE Signal Process. Magaz., 2004, 21, 15–27.
  • Zhao, H. V. and Liu, K. J. R. Fingerprint multicast in secure video streaming. IEEE Trans. Image Process., 2006, 15, 12–29.
  • Simitopoulos, D., Zissis, N., Georgiadis, P., Emmanouilidis, V. and Strintzis, M. G. Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD’, ACM Multimedia Sys. J., Special Issue on Multimedia Security, 2003, 9, 217–227.
  • Brown, I., Perkins, C. and Crowcroft, J. Watercasting: distributed watermarking of multicast media. Proc. 1st Int. Workshop on Networked Group Communication, Lecture Notes in Computer Science, Pisa, Italy, November 1999, Springer-Verlag, Vol. 1736, pp. 286–300.
  • Bloom, J. Security and rights management in digital cinema. Proc. IEEE Int. Conf. Acoustic, Speech and Signal Processing, Hong Kong, China, April 2003, IEEE Computer Society, Vol. 4, pp. 712–715.
  • Anderson, R. and Manifavas, C. Chamleon – a new kind of stream cipher. Lecture Notes in Computer Science, Fast Software Encryption, 1997, Vol. 1267, pp. 107–113 (Springer-Verlag, Berlin).
  • Lian, S., Liu, Z., Ren, Z. and Wang, H. Secure distribution scheme for compressed data streams. Proc. IEEE Conf. on Image processing, Atlanta, GA, USA, October 2006, IEEE Computer Society, pp. 1953–1956.
  • Lemma, A. N., Katzenbeisser, S., Celik, M. U. and Veen, M. V. Secure watermark embedding through partial encryption. Proc. Int. Workshop on Digital watermarking, Jeju Island, Korea, November 2006, Springer, Vol. 4283, pp. 433–445.
  • Cox, I., Kilian, J., Leighton, F. and Shamoon, F. Secure spread spectrum watermarking for multimedia. IEEE Trans. Imag. Process., 1997, 6, 1673–1687.
  • Pennebaker, W. B. and Mitchell, J. L. JPEG Still Image Compression Standard, 1993 (Van Nostrand Reinhold, New York).
  • Mollin, R. A. An Introduction to Cryptography, 2006 (CRC Press, Boca Raton, New York, London, Tokyo).
  • Lee, H. and Moon, S. Parallel stream cipher for secure high-speed communications. Signal Process., 2002, 82, 259–265.
  • Lian, S., Liu, Z., Ren, Z. and Wang, H. Secure advanced video coding based on selective encryption algorithms. IEEE Trans. Consumer Electron., 2006, 52, 621–629.
  • Security Requirements for Cryptographic Modules (Change Notice). Federal Information Processing Standards Publication (FIPS PUB) 140–1, 25 May 2001.
  • Petitcolas, F. A. P., Anderson, R. J. and Kuhn, M. G. Attack on copyright marketing systems. In: Information Hiding, 2nd Int. Workshop, IH’98, (Ed. D. Aucsmith), Portland, USA, April 1998, Portland, Oregon, USA, Lecture Notes in Computer Science, Vol. 1525, pp. 218–238 (Springer–Verlag, Berlin).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.