Hongyuan Li, Guangjie Liu, Yue-wei Dai, Zhiquan Wang
{"title":"Secure Multimedia Distribution Based on Watermarking and Encryption","authors":"Hongyuan Li, Guangjie Liu, Yue-wei Dai, Zhiquan Wang","doi":"10.4156/JCIT.VOL5.ISSUE9.29","DOIUrl":null,"url":null,"abstract":"Abstract In this paper, a secure content distribution scheme is proposed which transmits the multimedia content to users in a secure manner. In server side, the content is embedded by pseudorandom sequences (the customer’s ID) and then encrypted by another pseudorandom sequence. In user side, the content is decrypted with the some sequence as the encryption process. All the pseudorandom sequences are generated by the chaotic map under the control of secure key. The decrypted content is traceable to trace the illegally redistribution of the pirate. Theoretical and experimental results show that the scheme obtains high security of the encryption, imperceptibility and traceability. Additionally, the embedded watermarks are robustness against collusion attack.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Convergence Inf. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.29","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Abstract In this paper, a secure content distribution scheme is proposed which transmits the multimedia content to users in a secure manner. In server side, the content is embedded by pseudorandom sequences (the customer’s ID) and then encrypted by another pseudorandom sequence. In user side, the content is decrypted with the some sequence as the encryption process. All the pseudorandom sequences are generated by the chaotic map under the control of secure key. The decrypted content is traceable to trace the illegally redistribution of the pirate. Theoretical and experimental results show that the scheme obtains high security of the encryption, imperceptibility and traceability. Additionally, the embedded watermarks are robustness against collusion attack.