1st International ICST Workshop on Multimedia Security in Communication

Research Article

Integrating Fingerprint with Cryptosystem for Internet-Based Live Pay-TV System

  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4685261,
        author={Shuhui Hou and Yoshitaka Morimura and Tetsutaro Uehara and Michihiko Minoh and Takashi Satoh},
        title={Integrating Fingerprint with Cryptosystem for Internet-Based Live Pay-TV System},
        proceedings={1st International ICST Workshop on Multimedia Security in Communication},
        publisher={IEEE},
        proceedings_a={MUSIC},
        year={2008},
        month={11},
        keywords={pay-TV multimedia security fingerprinting code public-key cryptosystem},
        doi={10.1109/CHINACOM.2008.4685261}
    }
    
  • Shuhui Hou
    Yoshitaka Morimura
    Tetsutaro Uehara
    Michihiko Minoh
    Takashi Satoh
    Year: 2008
    Integrating Fingerprint with Cryptosystem for Internet-Based Live Pay-TV System
    MUSIC
    IEEE
    DOI: 10.1109/CHINACOM.2008.4685261
Shuhui Hou1,*, Yoshitaka Morimura1,*, Tetsutaro Uehara2,*, Michihiko Minoh2,*, Takashi Satoh3,*
  • 1: Dept. of Intelligence Science and Technology Graduate School of Informatics Kyoto University, Japan
  • 2: Acdemic Center for Computing and Media Studies Kyoto University, Japan
  • 3: Dept. of Information and Media Engineering Faculty of Enviromental Engineering The University of Kitakyushu, Japan
*Contact email: shuhui@mm.media.kyoto-u.ac.jp, morimura@mm.media.kyoto-u.ac.jp, uehara@media.kyoto-u.ac.jp, minoh@media.kyoto-u.ac.jp, tsatoh@env.kitakyu-u.ac.jp

Abstract

In the last few years, live pay-TV system via internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content protection is required. In this paper, a new architecture integrating fingerprint with cryptosystem is proposed to protect contents from unauthorized access and illegal redistribution. We describe a scheme integrating anti-collusion code and Home Page public-key cryptosystem. The proposed scheme is shown feasible and realistic for implementing with respect to computation/ communication cost.