Cryptology for digital TV broadcasting
- 1 June 1995
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Proceedings of the IEEE
- Vol. 83 (6) , 944-957
- https://doi.org/10.1109/5.387094
Abstract
Digital TV broadcasting needs new cryptological tools for conditional access, copyright protection and image authentication. The aim of this paper is to overview the corresponding systems' features. The description of a conditional access system is given. It is shown that equitable systems need the use of a Trusted Third Party. The design of efficient copyright protection by watermarking images and image authentication by signatures are also briefly discussedKeywords
This publication has 15 references indexed in Scilit:
- When is Seeing Believing?Scientific American, 1994
- The trustworthy digital camera: restoring credibility to the photographic imageIEEE Transactions on Consumer Electronics, 1993
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and MemoryPublished by Springer Nature ,1988
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Hiding information and signatures in trapdoor knapsacksIEEE Transactions on Information Theory, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- An extension of the Shannon theory approach to cryptographyIEEE Transactions on Information Theory, 1977
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949