|
[1] Dana J. Parker, “Defining DVD,” IEEE Multimedia, vol. 6, no. 1, pp. 80-85, Jan.-March 1999. [2] Jim Taylor, “DVD-Video: Multimedia for the Masses,” IEEE Multimedia, vol. 6, no. 3, pp. 86-92, July-Sept. 1999. [3] M. Miller, I. J. Cox, and J. A. Bloom, “Watermarking in the Real World: An Application to DVD”, Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on, vol. 2, pp. 1496-1502, 1999 [4] J. A. Bloom, I. J. Cox, T. Kalker, J. P. Linnartz, M. Miller, and C. Traw, “Copy Protection for DVD Video,” Proc. IEEE, vol. 87, pp. 1267-1276, July 1999. [5] D. Barr, “Copy Protection for High-Definition Baseband Video,” The International Conference on Information Technology: Coding and Computing (ITCC'00), Las Vegas, Nevada; 27-29 March 2000. [6] H. Morito, M. Roe, and E. Lee, “Digital Copy Protection Scheme Using Recording Medium Identifier,” 1999 International Workshops on Parallel Processing, Wakamatsu, Japan; 21-24 Sept. 1999. [7] B. H. Turnbull, “Important Legal Developments Regarding Protection of Copyrighted Content Against Unauthorized Copying,” IEEE Communications Magazine, vol. 39, pp. 92-100, Aug. 2001. [8] Changsheng Xu, Yongwei Zhu, and D. D. Feng, “Content Protection and Usage Control for Digital Music,” Web Delivering of Music, 2001. Proceedings. First International Conference on, pp. 51-58, 2001 [9] L. Gang, A. N. Akansu, M. Ramkumar, and Xuefei Xie, “On-line music protection and MP3 compression,” Intelligent Multimedia, Video and Speech Processing, 2001. Proceedings of 2001 International Symposium on, pp. 13-16, 2001. [10] Frederic Andres, “Media and Security,” IEEE Multimedia, vol. 8, no. 4, pp. 20-21, Oct.-Dec. 2001. [11] Hong Heather Yu, Deepa Kundur, and Ching-Yung Lin, “Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era,” IEEE Multimedia, vol. 8, no. 3, pp. 8-12, July-Sept. 2001. [12] Forouzan Golshani, “Digital-Watermarking Faces Challenges,” IEEE Multimedia, vol. 5, no. 3, pp. 6-7, July-Sept. 1998. [13] Rajiv Mehrotra, “Digital Copyright Battles Continue,” IEEE Multimedia, vol.7, no. 1, pp. 7-8, Jan.-March 2000. [14] Heather Yu, Xiangyang Kong, and Wayne Wolf, “Techniques for Content-Based Graph Authentication,” IEEE Multimedia, vol. 8, no. 4, pp. 38-45, Oct.-Dec. 2001. [15] Jana Dittmann, Petra Wohlmacher, and Klara Nahrstedt, “Using Cryptographic and Watermarking Algorithms,” IEEE Multimedia, vol. 8, no. 4, pp. 54-65, Oct.-Dec. 2001. [16] Chatschik C. Bisdikian, and Baiju V. Patel, “Cost-Based Program Allocation for Distributed Multimedia-on-Demand Systems,” IEEE Multimedia, vol. 3, no. 3, July-Sept. 1996. [17] I. J. Cox, J. Kiliant, T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1678, Dec. 1997. [18] G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking Digital Image and Video Data,” IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, Sept. 2000. [19] N. Memon, and P. W. Wong, “Protecting Digital Media Content,” Communications of the ACM, vol. 41, no. 7, pp. 35-43, July 1998. [20] C. T. Hsu, and J. L. Wu, “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processing, vol. 8, no. 1, pp. 58-68, Jan. 1999. [21] C. T. Hsu, and J. L. Wu, “DCT-Based Watermarking for Video,” IEEE Transactions on Consumer Electronics, vol. 44, no. 1, pp. 206-216, Feb. 1998. [22] W. Diffie, and M. Hellman “New Directions in Cryptography,” IEEE Transactions on Information Theory, Nov. 1976. [23] W. Diffie, and M. Hellman, “Exhaustive Crytanalysis of the NBS Data Encryption Standard,” Computer, June 1977. [24] T. ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, July 1985. [25] C. Schnorr, “Efficient Signatures for Smart Card,” Journal of Cryptology, no. 3, 1991. [26] Joan Daemen, and Vincent Rijmen, “AES Proposal: Rijndael,” Sept. 1999. [27] E. Bihan, “New Types of Cryptanalysis Attacks Using Related Keys,” Advances in Cryptology, Proceedings Eurocrypt’93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1993, pp. 398-409. [28] Chris Russell, Todd Avery Outten, Bryan Gentry Spaulding, Scott Jeffrey Sherr, Ira Steven Rubenstein, Yair Landau, Brian David Lakamp, Jeremy E. Barnett, Douglas Daiseug Chey, Michael R. Arrieta, Mary Korman, Harish Mandyam;, Thomas M. Rodriguez, Andrew Mosson, Ernesto Brodersohn, and Mary Abraham, “Secure digital content licensing system and method,” United State Patent Application 20020049679, 25 April 2002. [29] Tomoyuki Asano, and Yoshitomo Osawa, “Information Recording Device, Information Playback Device, Information Recording Method, Information Playback Method, and Information Recording Medium and Program Providing Medium Used Therewith,” United State Patent Application 20020044657, 18 April 2002. [30] David Rogoff, and Steven Petilli, “Cryptographic Key Distribution System and Method for Digital Video Systems,” United State Application 20020037081, 28 March 2002. [31] Chandler Brendan Stanton Traw, and David Wayne Aucsmith, “Content Protection for Transmission Systems,” United State Application 20020007452, 17 Jan. 2002. [32] Erlend Olson, David Rogoff, Steven Petilli, and Oleh Zajac, “Cryptographic Key Distribution System and Method for Digital Video Systems,” United State Application 20020003878, 10 Jan. 2002. [33] Yasuhiro Ishibashi, “Content Processing System and Content Protecting Method,” United State Application 20010021255, 13 Sept. 2001. [34] Chandler Brendan Stanton Traw, and David Wayne Aucsmith, “Content Protection for Transmission Systems,” United State Patent 5949877, 7 Sept. 1999. [35] Ryo Nakayama, and Isamu Iwamoto, “Content Protection Method and Content Protection System,” United State Patent 6209097, 27 March 2001. [36] 4C Entity, LLC, “Content Protection System Architecture: A Comprehensive Framework for Content Protection, Version 0.81.” [37] 4C Entity, LLC, “CPPM Specification: Introduction and Common Cryptographic Elements, Revision 0.93.” [38] 4C Entity, LLC, “CPRM Specification: Introduction and Common Cryptographic Elements, Revision 0.94.” [39] 4C Entity, LLC, “C2 Block Cipher Specification, Revision 0.9.” [40] 4C Entity, LLC, “CSS Compatible DVD Drive Authentication for CPPM, Revision 0.91.” [41] Frank A. Stevenson, “Cryptanalysis of Content Scramble System,” 8 Nov. 1999. [42] DVD Forum, “DVD Specifications for Read-Only Disc.” [43] Heitaro Nakajima, and Hiroshi Ogawa, “Compact Disc Technology,” Tokyo, Japan; Ohmsha, 1992. [44] Jim Taylor, “DVD Demystified,” Second Edition, New York, McGRAW-HILL, 2001. [45] Edited by Meta Nissley, and Nancy Melin Nelson, “CD-ROM Licensing and Copyright Issues for Libraries,” Westport, Meckler, 1990. [46] G. Simmons ed. “Contemporary Cryptology: The Science of Information Integrity,” Piscataway, IEEE Press, 1992. [47] C. Huitema, “IPv6: The New Internet Protocol,” Upper Saddle River, Prentice Hall, 1998. [48] William Stallings, “Cryptography and Network Security — Principles and Practice,” Second Edition, Upper Saddler River, NJ; Prentice Hall, 1999. [49] http://www.dvdforum.org/ [50] http://www.dvdfllc.co.jp/ [51] http://www.philips.com/ [52] http://www.mpegla.com/ [53] http://www.4centity.com/ [54] http://www.c-dilla.com/ [55] http://www.macrovision.com/index.html [56] http://www.sony.com/ [57] http://www.laserlock.com/ [58] http://www.linkdata.com/newhome/index.htm [59] http://www.spinner.nl/default.html [60] http://www.ttrtech.com/ [61] http://www.toolex.com/flash/index.html [62] http://www.dinamic.com/ [63] http://www.kochdigi.com/ [64] http://www.vob.de/ [65] http://www.disctronics.co.uk/ [66] http://www.digimarc.com/ [67] http://www.dtcp.com/ [68] http://www.dvdcca.org/
|