Hongyuan Li, Guangjie Liu, Yue-wei Dai, Zhiquan Wang
{"title":"基于水印和加密的安全多媒体分发","authors":"Hongyuan Li, Guangjie Liu, Yue-wei Dai, Zhiquan Wang","doi":"10.4156/JCIT.VOL5.ISSUE9.29","DOIUrl":null,"url":null,"abstract":"Abstract In this paper, a secure content distribution scheme is proposed which transmits the multimedia content to users in a secure manner. In server side, the content is embedded by pseudorandom sequences (the customer’s ID) and then encrypted by another pseudorandom sequence. In user side, the content is decrypted with the some sequence as the encryption process. All the pseudorandom sequences are generated by the chaotic map under the control of secure key. The decrypted content is traceable to trace the illegally redistribution of the pirate. Theoretical and experimental results show that the scheme obtains high security of the encryption, imperceptibility and traceability. Additionally, the embedded watermarks are robustness against collusion attack.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Secure Multimedia Distribution Based on Watermarking and Encryption\",\"authors\":\"Hongyuan Li, Guangjie Liu, Yue-wei Dai, Zhiquan Wang\",\"doi\":\"10.4156/JCIT.VOL5.ISSUE9.29\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract In this paper, a secure content distribution scheme is proposed which transmits the multimedia content to users in a secure manner. In server side, the content is embedded by pseudorandom sequences (the customer’s ID) and then encrypted by another pseudorandom sequence. In user side, the content is decrypted with the some sequence as the encryption process. All the pseudorandom sequences are generated by the chaotic map under the control of secure key. The decrypted content is traceable to trace the illegally redistribution of the pirate. Theoretical and experimental results show that the scheme obtains high security of the encryption, imperceptibility and traceability. Additionally, the embedded watermarks are robustness against collusion attack.\",\"PeriodicalId\":360193,\"journal\":{\"name\":\"J. Convergence Inf. Technol.\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"J. Convergence Inf. Technol.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.29\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Convergence Inf. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.29","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Multimedia Distribution Based on Watermarking and Encryption
Abstract In this paper, a secure content distribution scheme is proposed which transmits the multimedia content to users in a secure manner. In server side, the content is embedded by pseudorandom sequences (the customer’s ID) and then encrypted by another pseudorandom sequence. In user side, the content is decrypted with the some sequence as the encryption process. All the pseudorandom sequences are generated by the chaotic map under the control of secure key. The decrypted content is traceable to trace the illegally redistribution of the pirate. Theoretical and experimental results show that the scheme obtains high security of the encryption, imperceptibility and traceability. Additionally, the embedded watermarks are robustness against collusion attack.