{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:19:47Z","timestamp":1725542387933},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642104664"},{"type":"electronic","value":"9783642104671"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10467-1_62","type":"book-chapter","created":{"date-parts":[[2009,12,14]],"date-time":"2009-12-14T22:53:07Z","timestamp":1260831187000},"page":"708-718","source":"Crossref","is-referenced-by-count":0,"title":["Improving a Digital Rights Management Scheme for Video Broadcast"],"prefix":"10.1007","author":[{"given":"Yongdong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"62_CR1","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/s00530-002-0066-z","volume":"8","author":"S. Emmanuel","year":"2003","unstructured":"Emmanuel, S., Kankanhalli, M.S.: A Digital Rights Management Scheme for Broadcast Video. Multimedia Systems Journal\u00a08, 444\u2013458 (2003)","journal-title":"Multimedia Systems Journal"},{"key":"62_CR2","unstructured":"CASBAA, Pay-TV Piracy on the Rise in Asia: Study, AsiaMedia Media News Dialy (2006), http:\/\/news.yahoo.com\/s\/afp\/20061024\/ennew_afp\/asiatvindustrycrime_061024162529"},{"key":"62_CR3","unstructured":"Beasle, L.: Digital Deployment - Asia-Pacific Pay-TV Industry Study (October 2008), http:\/\/www.casbaa.com\/upload\/File\/Regulatory\/Anti-Piracy\/CASBAA_Cost_of_Piracy_2008.pdf"},{"key":"62_CR4","doi-asserted-by":"crossref","unstructured":"Kirovski, D., Peinado, M., Petitcolas, F.A.P.: Digital rights management for digital cinema. In: International symposium on optical science and technology, security in imaging, theory and applications (2001)","DOI":"10.1117\/12.449745"},{"key":"62_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/978-3-540-74835-9_37","volume-title":"Computer Security \u2013 ESORICS 2007","author":"H. Jin","year":"2007","unstructured":"Jin, H., Lotspiech, J.: Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 563\u2013577. Springer, Heidelberg (2007)"},{"issue":"1","key":"62_CR6","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/TIP.2005.860356","volume":"15","author":"H.V. Zhao","year":"2006","unstructured":"Zhao, H.V., Liu, K.J.R.: Fingerprint Multicast in Secure Video Streaming. IEEE Tran. on Image Processing\u00a015(1), 12\u201329 (2006)","journal-title":"IEEE Tran. on Image Processing"},{"key":"62_CR7","unstructured":"Judge, P., Ammar, M.: WHIM: watermarking multicast video with a hierarchy of intermediaries. In: International workshop on operating system support for digital audio and video (2000)"},{"key":"62_CR8","doi-asserted-by":"crossref","unstructured":"Zeng, W., Lei, S.: Efficient frequency domain digital video scrambling for content access control. In: ACM international conference on multimedia (1999)","DOI":"10.1145\/319463.319627"},{"issue":"5","key":"62_CR9","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Trans. on Information Theory\u00a044(5), 1897\u20131905 (1998)","journal-title":"IEEE Trans. on Information Theory"},{"key":"62_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/978-3-540-46703-8_18","volume-title":"Networked Group Communication","author":"I. Brown","year":"1999","unstructured":"Brown, I., Perkins, C., Crowcroft, J.: Watercasting: distributed watermarking of multicast media. In: Rizzo, L., Fdida, S. (eds.) NGC 1999. LNCS, vol.\u00a01736, pp. 286\u2013300. Springer, Heidelberg (1999)"},{"issue":"4","key":"62_CR11","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"N. Memon","year":"2001","unstructured":"Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing\u00a010(4), 643\u2013649 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"key":"62_CR12","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"9","author":"L. Qiao","year":"1998","unstructured":"Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownership and customers rights. J. Vis. Commun. Image Representation\u00a09, 194\u2013210 (1998)","journal-title":"J. Vis. Commun. Image Representation"},{"key":"62_CR13","doi-asserted-by":"crossref","unstructured":"Wu, Y., Pang, H.: A Lightweight Buyer-Seller Watermarking Protocol. Online Journal Advance in Multimedia, Article ID 905065 (2008), http:\/\/www.hindawi.com\/journals\/am\/2008\/905065.html","DOI":"10.1155\/2008\/905065"},{"key":"62_CR14","doi-asserted-by":"crossref","unstructured":"Anderson, R.J., Manifavas, C.: Chameleon A new kind of stream cipher. In: 4th Int. Workshop Fast Software Encryption, pp. 107\u2013113 (1997)","DOI":"10.1007\/BFb0052339"},{"issue":"3","key":"62_CR15","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1109\/TIFS.2008.926988","volume":"3","author":"M.U. Celik","year":"2008","unstructured":"Celik, M.U., Lemma, A.N., Katzenbeisser, S., van der Veen, M.: Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks. IEEE Trans. on Information Forensics and Security\u00a03(3), 475\u2013487 (2008)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"key":"62_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/3-540-48910-X_10","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"F. Ergun","year":"1999","unstructured":"Ergun, F., Kilian, J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 140\u2013149. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing - PCM 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10467-1_62.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:56:27Z","timestamp":1606186587000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10467-1_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642104664","9783642104671"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10467-1_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}