2016
DOI: 10.14257/ijsia.2016.10.4.26
|View full text |Cite
|
Sign up to set email alerts
|

Secure Multimedia Content Distribution for M2M Communication

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…• The systems proposed by Domingo-Ferrer and Megías (2013); Qureshi et al (2015Qureshi et al ( , 2016; Megías and Domingo-Ferrer (2014); Megías (2015); Li et al (2010); Hu and Li (2010); Ye et al (2016) guarantee traceability of copyright violators by using digital fingerprinting techniques. The systems proposed by Sun et al (2009);Win et al (2011) offer copyright protection based on DRM techniques but fail to provide traceability.…”
Section: Previous Work On P2p Content Distribution Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…• The systems proposed by Domingo-Ferrer and Megías (2013); Qureshi et al (2015Qureshi et al ( , 2016; Megías and Domingo-Ferrer (2014); Megías (2015); Li et al (2010); Hu and Li (2010); Ye et al (2016) guarantee traceability of copyright violators by using digital fingerprinting techniques. The systems proposed by Sun et al (2009);Win et al (2011) offer copyright protection based on DRM techniques but fail to provide traceability.…”
Section: Previous Work On P2p Content Distribution Systemsmentioning
confidence: 99%
“…In (Ye et al, 2016), a secure multimedia distribution framework is proposed, which combines multimedia encryption, copy detection, and digital fingerprinting to prevent widespread piracy. To deter legitimate users from illegally re-distributing the decrypted content, the scheme employs the ideas of joint copy detection and fingerprinting.…”
Section: Previous Work On P2p Content Distribution Systemsmentioning
confidence: 99%
“…Type 2 category are part of reference videos embedded into other videos.The type 3 videos are the videos that contain no parts of original reference videos. Precision and recall are used to evaluate the system Ye et al (2016) [16]. focused on mobile to mobile (M2M) communication for secure multimedia content distribution.…”
mentioning
confidence: 99%