By Topic

Secure Media Distribution in P2P Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Chen Xi ; Nanjing Univ., Nanjing

A secure content distribution scheme is presented in this paper, which can trace illegal distributors in Peer to Peer networks. In this scheme, the encrypted content is decrypted into different copy under the control of a fingerprint (e.g., peer ID) and encryption key at the peer side. Thus, each decrypted media copy contains a unique peer ID that identifies the peer. For the decryption operation and fingerprint embedding operation are combined together, which avoids the leakage of clear media content. Additionally, these operations are implemented by the peer, which makes the scheme compliant with existing peer to peer digital rights management (DRM) systems.

Published in:

Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on

Date of Conference:

1-3 Nov. 2007