{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T20:22:02Z","timestamp":1694636522738},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2009,6,1]],"date-time":"2009-06-01T00:00:00Z","timestamp":1243814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Broadcast."],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/tbc.2009.2020446","type":"journal-article","created":{"date-parts":[[2009,5,27]],"date-time":"2009-05-27T15:17:10Z","timestamp":1243437430000},"page":"425-436","source":"Crossref","is-referenced-by-count":15,"title":["Content and Service Protection for IPTV"],"prefix":"10.1109","volume":"55","author":[{"family":"Seong Oun Hwang","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"software watermarking: models and dynamic embeddings","author":"collberg","year":"2000","journal-title":"Proc 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.05.0105.0021"},{"key":"ref32","article-title":"selective encryption of multimedia content in distributed networks: challenges and new directions","author":"liu","year":"2003","journal-title":"Proc IASTED Communications Internet & Information Technology (CIIT)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.1995.540095"},{"key":"ref30","year":"2003","journal-title":"xCP eXtensible Content Protection"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.810588"},{"key":"ref36","author":"cox","year":"2001","journal-title":"Digital Watermarking"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"ref34","author":"arnold","year":"2003","journal-title":"Techniques and Applications of Digital Watermarking and Content Protection"},{"key":"ref60","year":"2001","journal-title":"MPEG-7 Multimedia Description Schemes"},{"key":"ref62","year":"2008","journal-title":"3G Security Security of Multimedia Broadcast\/Multicast Service (Release 8) Technical Specification Group Services and System Aspects"},{"key":"ref61","year":"2006","journal-title":"OMA DRM v2 0 Extensions for Broadcast Support"},{"key":"ref63","year":"2004","journal-title":"Broadcast-Multicast Service Security Framework"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1029146.1029150"},{"key":"ref64","year":"2005","journal-title":"Information Technology Coding of audio visual objectsPart 12 ISO base media file format"},{"key":"ref27","year":"2007","journal-title":"Content Protection and Copy Management Specification CPCM Authorised Domain Management"},{"key":"ref65","article-title":"on the (im)possibility of obfuscating programs","author":"barak","year":"2001","journal-title":"Proc Advances Cryptology"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.60"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/947380.947385"},{"key":"ref2","article-title":"part ii. section 3, service security and content protection","year":"2008","journal-title":"ITU-T FG Proceedings"},{"key":"ref1","year":"2005","journal-title":"An Introduction to IPTV (Television via Internet Protocol)"},{"key":"ref20","year":"2001","journal-title":"Internet Streaming Media Alliance Implementation Specification Version 1 0"},{"key":"ref22","year":"2005","journal-title":"Digital Transmission Content Protection Specification Volume 1 Revision 1 4 5C"},{"key":"ref21","author":"lipmaa","year":"0","journal-title":"CTR-Mode Encryption"},{"key":"ref24","year":"2006","journal-title":"High-bandwidth Digital Content Protection System Revision 1 3"},{"key":"ref23","year":"2003","journal-title":"CPPM\/CPRM Version 1 0"},{"key":"ref26","year":"2007","journal-title":"DVB-CPCM Bluebook A94r1 DVB Content Protection and Copy Management"},{"key":"ref25","year":"0","journal-title":"DCAS Specifications Host Device 2 5 Core Functional Requirements"},{"key":"ref50","year":"1998","journal-title":"The Digital Property Rights Language"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1029146.1029163"},{"key":"ref59","year":"0","journal-title":"Dublin Core"},{"key":"ref58","year":"2002","journal-title":"MPEG-21 RDD (Rights Data Dictionary)"},{"key":"ref57","year":"2002","journal-title":"MPEG-21 DID (Digital Item Declaration)"},{"key":"ref56","year":"0","journal-title":"INDECS"},{"key":"ref55","year":"2005","journal-title":"MPEG-21 DII (Digital Item Identification)"},{"key":"ref54","year":"0","journal-title":"URI"},{"key":"ref53","year":"0","journal-title":"DOI"},{"key":"ref52","article-title":"content protection and copy management specification: usage state information (usi)","year":"2007","journal-title":"DVB (Digital Video Broadcasting)"},{"key":"ref10","year":"2004","journal-title":"Conditional Access System for Terrestrial Broadcast Revision A"},{"key":"ref11","year":"2005","journal-title":"IP Datacast over DVB-H Service Purchase and Protection (SPP)"},{"key":"ref40","year":"1996","journal-title":"Method and System for Generating and Auditing a Signature for a Computer Program"},{"key":"ref12","year":"2007","journal-title":"Service and Content Protection for Mobile Broadcast Services Version 1 0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2401"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2451"},{"key":"ref15","author":"glenn","year":"2003","journal-title":"The AES-CBC Cipher Algorithm and Its Use With IPsec"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2404"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3711"},{"key":"ref19","year":"2004","journal-title":"Internet Streaming Media Alliance Encryption and Authentication Specification Version 1 0"},{"key":"ref4","year":"2008","journal-title":"Interoperable DRM Platform Specification Version 3 2"},{"key":"ref3","author":"rosenblatt","year":"2002","journal-title":"Digital Rights ManagementBusiness and Technology"},{"key":"ref6","year":"0","journal-title":"MPEG-21"},{"key":"ref5","year":"2006","journal-title":"OMA DRM Specification Version 2 0"},{"key":"ref8","year":"2004","journal-title":"Digital Video Broadcasting (DVB) Head-end implementation of DVB Simulcrypt"},{"key":"ref7","article-title":"coral consortium core architecture overview version 3.0","year":"2006","journal-title":"Coral Consortium"},{"key":"ref49","year":"2001","journal-title":"XrML (eXtensible rights Markup Language)"},{"key":"ref9","year":"1997","journal-title":"DVB-CI Common Interface Specification for Conditional Access and other Digital Video Broadcasting Decoder Applications"},{"key":"ref46","article-title":"towards realizing random oracles: hash functions that hide all partial information","author":"canetti","year":"1997","journal-title":"Proc Advances Cryptology"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/18.705568"},{"key":"ref48","year":"2002","journal-title":"Open Digital Rights Language Version 1 1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060669"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2000.884716"},{"key":"ref41","article-title":"robust object watermarking: applications to code","author":"stern","year":"1999","journal-title":"Proc Information Hiding"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45496-9_12","article-title":"a graph theoretic approach to software watermarking","author":"venkatesan","year":"2001","journal-title":"Proc 4th International Information Hiding Workshop"}],"container-title":["IEEE Transactions on Broadcasting"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11\/4976142\/04908975.pdf?arnumber=4908975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:51:22Z","timestamp":1633909882000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4908975\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":66,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tbc.2009.2020446","relation":{},"ISSN":["0018-9316","1557-9611"],"issn-type":[{"value":"0018-9316","type":"print"},{"value":"1557-9611","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6]]}}}