2016
DOI: 10.1016/j.jnca.2016.03.007
|View full text |Cite
|
Sign up to set email alerts
|

PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting

Abstract: The use of peer-to-peer (P2P) networks for multimedia distribution has spread out globally in recent years. The mass popularity is primarily driven by cost-effective distribution of content, also giving rise to piracy. An end user (buyer/peer) of a P2P content distribution system does not want to reveal his/her identity during a transaction with a content owner (merchant), whereas the merchant does not want the buyer to further distribute the content illegally.To date, different P2P distribution systems have b… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
34
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 20 publications
(34 citation statements)
references
References 40 publications
0
34
0
Order By: Relevance
“…Although the selective public-key encryption of the multimedia content, which affects only a few coefficients, results in lesser data expansion, it imposes a computational burden on a merchant and an increased complexity for file reconstruction at the buyer's end. More recently, Qureshi et al (2016) took advantage of some of these ideas, but replaced homomorphic encryption by fragmentation, symmetric encryption, permutation and distribution of the fragments through a collection of proxy peers. Furthermore, the embedding step is pre-computed using a string of all '1's and one of all '0's and, hence, no actual embedding is required for each transaction.…”
Section: Previous Work On P2p Content Distribution Systemsmentioning
confidence: 99%
See 4 more Smart Citations
“…Although the selective public-key encryption of the multimedia content, which affects only a few coefficients, results in lesser data expansion, it imposes a computational burden on a merchant and an increased complexity for file reconstruction at the buyer's end. More recently, Qureshi et al (2016) took advantage of some of these ideas, but replaced homomorphic encryption by fragmentation, symmetric encryption, permutation and distribution of the fragments through a collection of proxy peers. Furthermore, the embedding step is pre-computed using a string of all '1's and one of all '0's and, hence, no actual embedding is required for each transaction.…”
Section: Previous Work On P2p Content Distribution Systemsmentioning
confidence: 99%
“…• Win et al (2011);Domingo-Ferrer and Megías (2013); Qureshi et al (2015Qureshi et al ( , 2016; Megías and Domingo-Ferrer (2014); Megías (2015) guarantee revocable privacy. In these systems, the real identity of the users is only revealed by the trusted third party, i.e.…”
Section: Previous Work On P2p Content Distribution Systemsmentioning
confidence: 99%
See 3 more Smart Citations