Content protection with bitstream watermarking at decryption stage
Prikladnaya Diskretnaya Matematika. Supplement, no. 7 (2014), pp. 73-74.

Voir la notice de l'article provenant de la source Math-Net.Ru

A new method for protecting digital video content from illegal copying is proposed. Before spreading to clients, a content is encrypted by a stream cipher with a key stream filter generator. At the same time, the latter is an encryption key of the cipher. Every client receives the content together with a decryption key which differs from the encryption key only by the filtering function. This difference is such that the decrypted content differs from the original one in several unique bits not essentially distorting the video and completely identifying the client.
Mots-clés : content protection
Keywords: bitstream watermarking, video streaming.
@article{PDMA_2014_7_a31,
     author = {V. A. Anjin},
     title = {Content protection with bitstream watermarking at decryption stage},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {73--74},
     publisher = {mathdoc},
     number = {7},
     year = {2014},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2014_7_a31/}
}
TY  - JOUR
AU  - V. A. Anjin
TI  - Content protection with bitstream watermarking at decryption stage
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2014
SP  - 73
EP  - 74
IS  - 7
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2014_7_a31/
LA  - ru
ID  - PDMA_2014_7_a31
ER  - 
%0 Journal Article
%A V. A. Anjin
%T Content protection with bitstream watermarking at decryption stage
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2014
%P 73-74
%N 7
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2014_7_a31/
%G ru
%F PDMA_2014_7_a31
V. A. Anjin. Content protection with bitstream watermarking at decryption stage. Prikladnaya Diskretnaya Matematika. Supplement, no. 7 (2014), pp. 73-74. http://geodesic.mathdoc.fr/item/PDMA_2014_7_a31/

[1] Mistry D., “Comparison of digital water marking methods”, Int. J. Comp. Sci. Engin., 2:9 (2010), 2905–2909

[2] Wang P., Tamper Resistance for Software Protection, A Thesis for the Degree of Master of Science, Information and Communications University, Daejeon, Korea, 2005

[3] Langelaar G. C., Real-time Watermarking Techniques for Compressed Video Data, Delft University of Technology, Delft, 2000, 155 pp.