Methods for encrypting and decrypting MPEG video data efficiently
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
A fast MPEG video encryption algorithm
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain
ICASSP '97 Proceedings of the 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '97) -Volume 4 - Volume 4
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Blind pattern matching attack on watermarking systems
IEEE Transactions on Signal Processing
Anti-collusion fingerprinting for multimedia
IEEE Transactions on Signal Processing
Efficient frequency domain selective scrambling of digital video
IEEE Transactions on Multimedia
Statistical invisibility for collusion-resistant digital video watermarking
IEEE Transactions on Multimedia
IEEE Transactions on Multimedia
Scalable protection for MPEG-4 fine granularity scalability
IEEE Transactions on Multimedia
Multiresolution scene-based video watermarking using perceptual models
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Fingerprint multicast in secure video streaming
IEEE Transactions on Image Processing
A format-compliant configurable encryption framework for access control of video
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
In this paper, a new multimedia joint encryption and fingerprinting (JEF) scheme embedded into the advanced access content system (AACS) is proposed for multimedia transmission over networks. AACS is selected because it has been jointly developed by many famous companies and has been considered as the leading technology in content access control and multimedia distribution. In this framework, many attack points exist and can be exploited to defeat it. Furthermore, multiple attack points can be combined to form multi-point collusion attacks, which also endanger the proposed system. In this paper, we address the security concerns toward AACS-compatible JEF system in its entirety and propose solutions to cope with some security threats. The contributions of this paper include: (i) applying multimedia encryption at different points to resist some attacks points; (ii) proposing rewritable fingerprint embedding (RFE) to deal with some multi-point collusion attacks; (iii) designing a perceptual security spectrum metric (PSSM) to evaluate the degree of security when multiple encryptions are applied. The feasibility of the proposed AACS-compatible JEF method is further demonstrated through simulation results.