{"title":"IP Multicast Video Broadcasting System with User Authentication","authors":"Hiroki Onishi, T. Satoh, T. Uehara, K. Yamaoka","doi":"10.1109/ICME.2005.1521639","DOIUrl":null,"url":null,"abstract":"This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this proposed system, contents are broadcast to all terminals using IP multicast. Contents are encrypted so that legitimate users can decode them with a private key and session keys. As a key management scheme, the Tracing Traitor scheme is adopted because it offers advantages in scalability. The system can also embed digital watermarks, which act as a psychological deterrent to illegal copying and distribution of copyrighted contents. Finally, implementation of an application system is described and efficient broadcasting of contents with this system is demonstrated","PeriodicalId":244360,"journal":{"name":"2005 IEEE International Conference on Multimedia and Expo","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 IEEE International Conference on Multimedia and Expo","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICME.2005.1521639","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this proposed system, contents are broadcast to all terminals using IP multicast. Contents are encrypted so that legitimate users can decode them with a private key and session keys. As a key management scheme, the Tracing Traitor scheme is adopted because it offers advantages in scalability. The system can also embed digital watermarks, which act as a psychological deterrent to illegal copying and distribution of copyrighted contents. Finally, implementation of an application system is described and efficient broadcasting of contents with this system is demonstrated