2006
DOI: 10.1109/tip.2005.860356
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprint multicast in secure video streaming

Abstract: Abstract-Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 26 publications
0
17
0
Order By: Relevance
“…Multimedia fingerprinting techniques (Boneh and Shaw 1998;Trappe et al 2003;Wu et al 2003;Zhao and Liu 2006) are developed to deal with the illegal redistribution problem. Before transmitting digital content from the content producer to the legal users, a digital fingerprint should have already been embedded into the content.…”
Section: Overviewmentioning
confidence: 99%
“…Multimedia fingerprinting techniques (Boneh and Shaw 1998;Trappe et al 2003;Wu et al 2003;Zhao and Liu 2006) are developed to deal with the illegal redistribution problem. Before transmitting digital content from the content producer to the legal users, a digital fingerprint should have already been embedded into the content.…”
Section: Overviewmentioning
confidence: 99%
“…Therefore, proper coding techniques can be used to generate fingerprint such that it is resistant against collusion attacks. The most popular coding techniques are orthogonal fingerprinting and coded fingerprinting using BIBD techniques [12][13][14].…”
Section: Figure 2 Simplified Block Diagram Of Jfdmentioning
confidence: 99%
“…The joint fingerprinting and decryption (JFD) technique can fulfill this requirement. Since, the JFD technique provides lesser system complexity, better real time system performance and is resistant against various types of collusion attacks [12][13][14], it is the most promising technique for multimedia authentication.…”
Section: Introductionmentioning
confidence: 99%
“…Generally, three major post-tracing methods are digital fingerprinting, black-box confirmation and traitor tracing. Digital fingerprinting technology (e.g., [10][11][12][13]) embeds a unique label into the digital content so as to identify the illegal distributor. Since this technology is tightly related to watermarking, and it is orthogonal to the objective of this paper.…”
Section: Piracy Preventionmentioning
confidence: 99%