Proceedings of the Sixth ACM International Conference on Multimedia - MULTIMEDIA '98 1998
DOI: 10.1145/290747.290751
|View full text |Cite
|
Sign up to set email alerts
|

Protecting VoD the easier way

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2000
2000
2009
2009

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…When a proxy is present, the major approach for distribution control relies on encryption and decryption and focuses on improving their efficiencies. For example, early work [17], [18], [19] considers how to speed up the decryption and encryption process. The scheme proposed in [11] relies on costly hardware support to deal with member collusion.…”
Section: Related Workmentioning
confidence: 99%
“…When a proxy is present, the major approach for distribution control relies on encryption and decryption and focuses on improving their efficiencies. For example, early work [17], [18], [19] considers how to speed up the decryption and encryption process. The scheme proposed in [11] relies on costly hardware support to deal with member collusion.…”
Section: Related Workmentioning
confidence: 99%
“…The efficacy of encrypting headers is summarily rejected in some cases by others (Griwodz [10], for example, states "reconstruction of headers in MPEG-1 is relatively simple because current encoders produce CBR streams and use always the same header data anyway"), a point which we will examine more critically in Section 4 below. Encrypting headers may also have consequences for the ability of intermediate processing that uses headers to be applied to an encrypted stream [39].…”
Section: 3mentioning
confidence: 99%
“…Random Corruption Griwodz et al [9,10] propose randomly corrupting MPEG video information (that would be cached close to users); the correct bytes are sent to a user at the time the content decoding is enabled. Contrary to many other researchers (who are targeting secrecy or are unclear on what level of security they are trying to achieve), Griwodz et al find approximately 1% of bytes degraded to satisfactory achieve their goal of rendering movie content undecodable or unwatchable.…”
Section: 8mentioning
confidence: 99%
“…Yet another approach [17] proposes to multicast corrupted content, and unicast correction codes, so that the corrected plaintext bears a watermark. Since the correction codes are much smaller than the content being multicast, the technique is adequate for large numbers of receivers.…”
Section: Protection Of Multicast Contentmentioning
confidence: 99%