Multimedial security handbook

812 103 0
Multimedial security handbook

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Multimedia Security Handbook Editors-in-Chief and Authors Borko Furht Darko Kirovski CRC PR E S S Boca Raton London New York Washington, D.C Library of Congress Cataloging-in-Publication Data Multimedia security handbook / edited by Borko Furht, Darko Kirovski p cm – (Internet and communications) Includes bibliographical references and index ISBN 0-8493-2773-3 (alk paper) Multimedia systems – Security measures – Handbooks, manuals, etc Intellectual property – Handbooks, manuals, etc I Furht, Borivoje II Kirovski, Darko III Title IV Series QA76.9.A25M85 2004 005.8–dc22 2004055105 This book contains information obtained from authentic and highly regarded sources Reprinted material is quoted with permission, and sources are indicated A wide variety of references are listed Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher All rights reserved Authorization to photocopy items for internal or personal use, or the personal or internal use of specific clients, may be granted by CRC Press, provided that $1.50 per page photocopied is paid directly to Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923 USA The fee code for users of the Transactional Reporting Services is ISBN 0-8493-2773-3/ 05/$0.00 ỵ $1.50 The fee is subject to change without notice For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged The consent of CRC Press does not extend to copying for general distribution, for promotion, for creating new works, or for resale Specific permission must be obtained in writing from CRC Press for such copying Direct all inquiries to CRC Press, 2000 N.W Corporate Blvd., Boca Raton, Florida 33431 Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation, without intent to infringe Visit the CRC Press Web site at www.crcpress.com ß 2005 by CRC Press No claim to original U.S Government works International Standard Book Number 0-8493-2773-3 Library of Congress Card Number 2004055105 Printed in the United States of America Printed on acid-free paper INTERNET and COMMUNICATIONS This new book series presents the latest research and technological developments in the field of Internet and multimedia systems and applications We remain committed to publishing high-quality reference and technical books written by experts in the field If you are interested in writing, editing, or contributing to a volume in this series, or if you have suggestions for needed books, please contact Dr Borko Furht at the following address: Borko Furht, Ph.D Department Chairman and Professor Computer Science and Engineering Florida Atlantic University 777 Glades Road Boca Raton, FL 33431 U.S.A E-mail: borko@cse.fau.edu Preface Recent advances in digital communications and storage technologies have brought major changes for consumers High-capacity hard disks and DVDs can store a large amount of audiovisual data In addition, faster Internet connection speeds and the emerging high-bit-rate DSL connections provide sufficient bandwidth for entertainment networks These improvements in computers and communication networks are radically changing the economics of intellectual property reproduction and distribution Intellectual property owners must exploit new ways of reproducing, distributing, and marketing their intellectual property However, a major problem with current digital distribution and storage technologies is the great threat of piracy The purpose of the Multimedia Security Handbook is to provide a comprehensive reference on advanced topics in this field The handbook is intended both for researchers and practitioners in the field, and for scientists and engineers involved in designing and developing systems for the protection of digital multimedia content The handbook can also be used as the textbook for graduate courses in the area of multimedia security The handbook addresses a variety of issues related to the protection of digital multimedia content, including audio, image, and video protection The state-of-the art multimedia security technologies are presented, including protection architectures, multimedia encryption, watermarking, fingerprinting and authentication techniques, and various applications This handbook is comprised of 26 chapters divided into parts Part I, General Issues, introduces fundamental concepts applied in the protection of multimedia content and discusses the vulnerability of various protection schemes Part II, Multimedia Encryption, includes chapters on audio, image, and video encryption techniques These techniques deal with selective video encryption, which meet real-time requirements, chaos-based encryption, and techniques for protection of streaming media Part III, Multimedia Watermarking, consists of chapters dealing with various watermarking techniques, including audio, image, and video watermarking Current state-of-the art and future trends are addressed, including multidimensional, fragile, and robust watermarks Part IV, Multimedia Data Hiding, Fingerprinting, and Authentication, includes chapters on various issues related to these techniques The topics include fundamentals on lossless data hiding, digital media fingerprinting techniques, scalable and signature-based media authentication, and attacking such media protections schemes Part V, Applications, includes chapters that describe applications of multimedia protection schemes The topics, such as application taxonomy, digital rights management, and techniques for adult image filtering, are covered in this part We would like to thank the authors, who are world experts in the field, for their contributions of individual chapters to the handbook Without their expertise and effort, this handbook would never come to fruition CRC Press editors and staff also deserve our sincere recognition for their support throughout the project Borko Furht and Darko Kirovski Editors-in-Chief and Authors Borko Furht is a professor and chairman of the Department of Computer Science and Engineering at Florida Atlantic University ( FAU ) in Boca Raton, Florida Before joining FAU, he was a vice-president of research and a senior director of development at Modcomp ( Ft Lauderdale), a computer company of Daimler Benz, Germany, and a professor at the University of Miami in Coral Gables, Florida Professor Furht received Ph.D degrees in electrical and computer engineering from the University of Belgrade His current research is in multimedia systems, video coding and compression, video databases, wireless multimedia, and Internet computing He is the author of numerous books and articles in the areas of multimedia, computer architecture, real-time computing, and operating systems He is a founder and editor-in-chief of the Journal of Multimedia Tools and Applications ( Kluwer Academic Publishers) He has received several technical and publishing awards and has consulted for many high-tech companies, including IBM, Hewlett-Packard, Xerox, General Electric, JPL, NASA, Honeywell and RCA He has also served as a consultant to various colleges and universities He has given many invited talks, keynote lectures, seminars, and tutorials Darko Kirovski received his Ph.D degree in computer science from the University of California, Los Angeles, in 2001 Since April 2000, he has been a researcher at Microsoft Research His research interests include certificates of authenticity, system security, multimedia processing, biometric identity authentication, and embedded system design and debugging He has received the 1999 Microsoft Graduate Research Fellowship, the 2000 ACM/IEEE Design Automation Conference Graduate Scholarship, the 2001 ACM Outstanding Ph.D Dissertation Award in Electronic Design Automation, and the Best Paper Award at the ACM Multimedia 2002 List of Contributors Adnan M Alattar, Digimarc Corporation, 19801 SW 72nd Ave., Ste 250, Tualatin, OR 97062 Rolf Blom, Ericsson Research, Communications Security Laboratory, Ericsson AB, Sweden A Briassouli, Beckman Institute, Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, Urbana, IL 61801 Elisabetta Carrara, Ericsson Research, Communications Security Laboratory, Ericsson AB, Sweden Shih-Fu Chang, Department of Electrical Engineering, Columbia University, New York, New York 10027 Guanrong Chen, Department of Electronic Engineering, City University of Hong Kong, Kowloon Toon, Hong Kong SAR, China Mohamed Daoudi, MIIRE Group, LIFL/INT ENIC-Telecom Lille1, Cite´ Scientifique, 59655 Villeneuve d’Ascq, France Petros Daras, Information Processing Laboratory, Electrical and Computer Engineering Department, Aristotle University of Thessaloniki, 540 06 Thessaloniki, Greece Edward J Delp, Video and Image Processing Laboratory (VIPER), School of Electrical and Computer Engineering, Purdue University, West Lafayette, Indiana 47907 Chabane Djeraba, MIIRE Group, LIFL/INT ENIC-Telecom Lille1, Cite´ Scientifique, 59655 Villeneuve d’Ascq, France Digital Rights Management Issues for Video cinema, as they can be transmitted to the cinema halls through electronic transmission methods or through stored media such as DVDs, which are much more manageable than the bulkier and heavier film reels Making copies of film reels for distributing to cinema halls is an enormous task compared to making copies in the digital domain In addition, digital cinema can incorporate advanced theatrical experiences such as moving seats and so forth through the use of metadata Usually, movies are mastered on a film and are then digitized to obtain the digital version However, with the introduction of high-definition digital camcorders, motion pictures are mastered directly in the digital domain This digital movie is then compressed, encrypted, and delivered to the cinema halls At the cinema hall, the digital movie is temporarily stored, decrypted, decompressed, and projected or played back The cinema halls are equipped with a storage system and a projector system There are two models for the secure storage and play back of digital cinema content: the broadcast server model and the data server model In the broadcast server model, the storage system provides for temporary storage, decryption decompression, and local encryption The projector system implements local decryption and play back As far as security is concerned, the storage system and the projector system need to be physically secured and the communication between the projector system and the storage system need to be secured through local encryption However, in the data server model, the storage system needs only temporary storage and the projection system implements decryption, decompression, and play back In this model, only the projector system needs to be physically protected The audio stream and other advanced feature control streams are routed to the relevant processor and played back after decryption and demultiplexing by the storage or play back system The producer should employ a strong encryption scheme and the key needs to be transmitted through a secure channel to the security manager in the cinema hall Usually for enhanced security and control, producers or distributors apply the encryption in such a way that it can be decrypted only in a designated storage or projector system and they can also control the play back schedules or revoke the play back if the storage or play back system is found compromised or the exhibitor is found aiding in piracy In a film-based cinema system, pirates can make a pirate copy by taking possession of film reels and digitizing the content This is possible because the reel content is not encrypted In the case of digital cinema, because the digital cinema content is transferred in an encrypted mode, it would be difficult for the pirates to break the encryption scheme to make a pirated copy Another technique for making a pirated copy is by directly videographing off the screen during the show In order to trace and control this kind of piracy in digital cinema systems, digital watermarking techniques can be employed None of the current digital 783 MULTIMEDIA SECURITY HANDBOOK cinema systems explicitly mention the use of any schemes for tracing piracy The current systems only provide conditional access using an encryption scheme Thus, much work remains to be done in this area The Society for Motion Picture and Television Engineers (SMPTE) of the United States has constituted the DC28 digital cinema technology committee, a working group to discuss the various issues that face the full deployment of digital cinema DC28 is divided into seven study groups: mastering, compression, conditional access, transport and delivery, audio, theater systems, and projection The European counterpart of SMPTE is the European Digital Cinema Forum ( EDCF ), where study groups from different European countries share their information on digital cinema and the ‘‘technical module’’ is where all of the security research is being performed CONCLUSION This chapter discusses the rights requirements of each party involved over the life cycle of the digital video It also discusses various requirements to DRM stemming from asset management and usage controls needs In addition, the requirements and constraints to DRM, business, legal, and social aspects of DRM have also presented The technical aspect of DRM elaborates on the technologies used for obtaining DRM, techniques and tools for obtaining DRM in digital video broadcasts, stored video such as DVDs, and digital cinema, and standardization efforts by bodies such as MPEG, IETF, W3C, SMPTE, and so forth Most of the current DRM systems support confidentiality against nonconsumers Some of the systems implement copy protection and control mechanisms Some envisage the use of fingerprinting mechanisms for tracing piracy These systems are essentially intended to mitigate the concerns of owners Although the trading protocols and rights languages are being designed with the intention of supporting consumer concerns, the supporting cryptographic and watermarking techniques and protocols are yet to be designed A full-fledged DRM system should be capable of supporting the rights of all parties (creators, owners, distributors, and consumers) involved in digital asset creation and transaction DRM in its broadest sense is end-to-end management of digital trust Therefore, tremendous research challenges abound in this vital area of information security REFERENCES The Open Digital Rights Language, http://odrl.net/, 2002 Iannella, R., Digital rights management (DRM) architectures, D-Lib Mag., 7(6), 2001 ă ytynoja, M., Seppaănen, T., and Cvejic, N., Experimental DRM Architecture Using Lo Watermarking and PKI, presented at First International Mobile IPR Workshop: Rights Management of Information Products on the Mobile Internet Helsinki, 2003 784 Digital Rights Management Issues for Video Mooney, S., Interoperability: Digital rights management and the emerging ebook environment, D-Lib Mag., 7(1), 2001 Linnartz, J.P., Depovere, G., and Kalker, T., Philips Electronics Response to Call for Proposals Issued by the Data Hiding SubGroup Copy Protection Technical Working Group, July 1997 Peinado, M., Petitcolas, F.A.P., and Kirovski, D., Digital rights management for digital cinema, Multimedia Syst., 9, 228–238, 2003 The MPEG Home Page, http://www.chiariglione.org/mpeg/ The Copy Protection Technical Working Group, http://www.cptwg.org/ DVD The DVD Copy Control Association, http://www.dvdcca.org/ 10 Park, J and Sandhu, R., Towards Usage Control Models: Beyond Traditional Access Control, in Proceedings of 7th ACM Symposium on Access Control Models and Technologies, 2002, pp 57–64 11 Emmanuel, S and Kankanhalli, M.S., A digital rights management scheme for broadcast video, Multimedia Syst., 8(6), pp 444–458, 2003 12 Erickson, J.S., Fair Use, DRM, and trusted computing, Commn ACM, 46(4), 34–39, 2003 13 Fox, B.L and LaMacchia B.A., Encouraging recognition of fair uses in DRM systems Commn ACM, 46(4), 61–63, 2003 14 Cohen, J.E., DRM and privacy, Commn ACM, 46(4), 47–49, 2003 15 Korba, L and Kenny, S., Towards Meeting the Privacy Challenge: Adapting DRM, in Proceedings of ACM Workshop on Digital Rights Management, 2002 16 Durfee, G and Franklin, M., Distribution chain security, in Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, ACM Press, New York, 2000, pp 63–70 17 DRM Business Models, http://www.microsoft.com/windows/windowsmedia/wm7/ drm/scenarios.aspx 18 Liu, Q., Safavi-Naini, R., and Sheppard, N.P., Digital Rights Management for Content Distribution, presented at Australasian Information Security Workshop, Adelade, 2003 19 Sobel, L.S., DRM as an Enabler of Business Models: ISPs as Digital Retailers, presented at Digital Rights Management Conference, The Berkeley Center for Law and Technology, February, 2003 20 Horne, B., Pinkas, B., and Sander, T., Escrow Services and Incentives in Peer-to-Peer Networks, presented at 3rd ACM Conference on Electronic Commerce, 2001 21 Clark, D., Future of Intellectual Property: How Copyright Became Controversial, in Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, 2002 22 Clayson, P.L., and Dallard, N.S., Systems Issues in the Implementation of DVB Simulcrypt Conditional Access, Presented at International Broadcasting Convention, 1997, pp 470–475 23 Rosnay, M.D., Digital Right Management Systems Toward European Law: Between Copyright Protection and Access Control, in Proceedings of the 2nd International Conference on WEB Delivering of Music, 2002 24 Samuelson, P., Encoding the law into digital libraries, Commn ACM, 41(4), 13–18, 1998 25 Williams, J., IT Architecture meets the real (legal) world, IT Prof., 3(5), 65–68, 2001 26 Mooij, W., Advances in Conditional Access Technology, presented at International Broadcasting Convention, 1997, pp 461–464 27 Zeng, W and Lei, S., Efficient Frequency Domain Digital Video Scrambling for Content Access Control, presented at ACM Multimedia ’99 Proceedings, Orlando, FL, 1999 28 Anderson, R and Manifavas, C., Chameleon—A New Kind of Stream Cipher, in Proceedings of the 4th Workshop on Fast Software Encryption, Haifa, 1997 29 Emmanuel, S and Kankanhalli, M.S., Copyright Protection for MPEG-2 Compressed Broadcast Video, in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME 2001), Tokyo, 2001 785 MULTIMEDIA SECURITY HANDBOOK 30 Hartung, F and Kutter, M., Multimedia watermarking techniques, Proc IEEE, 87(7), 1079–1107, 1999 31 Braudaway, G.W., Magerlein, K.A., and Mintzer, F., Protecting Publicly Available Images with a Visible Image Watermark, presented at International Conference on Image Processing, 1997, Vol 1, pp 524–527 32 Meng, J and Chang, S.F., Embedding Visible Video Watermarks in the Compressed Domain, presented at International Conference on Image Processing, 1998, Vol 1, pp 474–477 33 Cox, I.J., Killian, J., Leighton, T and Shamoon, T., Secured spread spectrum watermarking for multimedia IEEE Trans Image Process., 6(12), 1673–1687, 1997 34 Hartung, F and Girod, B., Watermarking of uncompressed and compressed video, Signal Process., 66(3), 283–301, 1998 35 Kundur, D and Hatzinakos, D., Digital Watermarking Using Multiresolution Wavelet Decomposition, in Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, 1998, Vol 5, pp 2969–2972 36 Barni, M., Bartolini, F., Cappellini, V., and Piva, A., A DCT domain system for robust image watermarking, Signal Process., 66(3), 357–372 37 Podilchuk, C.I and Zeng, W., Digital image watermarking using visual models, in Proceedings of the IS&T/SPIE Conference on Human Vision and Electronic Imaging II, San Jose, CA, USA, B.E Rogowitz and T.N Pappas, Eds., IS&T and SPIE, 1997, pp 100–111 38 Bormans, J., Gelissen, J., and Perkis, A., MPEG-21: The 21st century multimedia framework, IEEE Signal Process Mag., 20(2), 53–62, 2003 39 Piva, A., Barni, M., Bartolini, F., and Cappellini, V., DCT-based Watermark Recovering Without Resorting to the Uncorrupted Original Image, presented at International Conference on Image Processing, 1997, Vol 1, pp 520–523 40 Wolfgang, R.B and Delp, E.J., A Watermarking Technique for Digital Imagery: Further Studies, in Proceedings of IEEE International Conference on Imaging, Systems, and Technology, Las Vegas, 1997, pp 279–287 41 Adelsbach, A and Sadeghi, A.R., Zero-Knowledge Watermark Detection and Proof of Ownership, in Proceedings of Fourth Information Hiding Workshop, IHW2001, Pittsburgh, 2001 42 Craver, S., Zero knowledge watermark detection, in Proceedings of the Third International Workshop on Information Hiding, Lecture Notes in Computer Science Vol 1768, Springer-Verlag, Berlin, 2000, pp 101–116 43 Eggers, J.J., Su, J.K., and Girod, B., Asymmetric watermarking schemes, in Proceedings of Sicherheit in Mediendaten, Berlin, September 2000, Springer-Verlag, Berlin, 2000 44 Pfitzmann, B and Schunter, M., Asymmetric fingerprinting (extended abstract), in Advances in Cryptology — EUROCRYPT’96, Maurer, U., Ed., Lecture Notes in Computer Science, Vol 1070, Springer-Verlag, Berlin, 1996, pp 84–95 45 Langelaar, G.C., Lagendijk, R.L., and Biemond, J., Removing Spatial Spread Spectrum Watermarks, Presented at European Signal Processing Conference (EUSIPCO’98), Rhodes, Greece, 1998 46 Cox, I.J and Linnartz, J.P., Some general methods for tampering with watermarks, IEEE J Selected Areas Commn., 16(4), 587–593, 1998 47 Craver, S., Memon, N., Yeo, B., and Yeung, M.M., Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications, IEEE J Selected Areas Commn., 16(4), 573–586, 1998 48 Internet Open Trading Protocol (trade), http://www.ietf.org/html.charters/tradecharter.html 49 The W3C Trading Protocols, http://www.w3.org/Help/siteindex 786 Digital Rights Management Issues for Video 50 Kwok, S.H., Cheung, S.C., Wong, K.C., Tsang, K.F., Lui, S.M., and Tam, K.Y., Integration of digital rights management into internet open trading protocol (IOTP) Dec Support Syst., 34(4), 413–425, (2003) 51 The Extensible rights Markup Language, http://www.xrml.org 52 Mulligan D and Burstein A., Implementing Copyright Limitations in Rights Expression, in Languages Proceedings of ACM Workshop on Digital Rights Management, 2002 53 Wang, X., Lao, G., DeMartini, T., Reddy, H., Nguyen, M., and Valenzuela, E., XrML — Extensible rights Markup Language, in Proceedings of the 2002 ACM Workshop on XML Security, 2002, pp 71–79 54 Messerges, T.S and Dabbish, E.A., Digital Rights management in a 3G Mobile Phone and Beyond, in Proceedings of ACM Workshop on Digital Rights Management, 2003 55 Hartung, F and Ramme, F., Digital rights management and watermarking of multimedia content for M-commerce applications, IEEE Commn Mag., 38(11), 78–84, 2000 56 ISO/IEC TC JTC1/SC 29/WG11/N 6269: Information Technology — Multimedia Framework ( MPEG-21) – Part 1: Vision, Technology and Strategy 57 ISO/IEC 13818-1: Generic Coding of Moving Pictures and Associated Audio: Systems ( MPEG-2 Systems) 58 ISO/IEC 14496-1: Coding of Audiovisual Objects: Systems ( MPEG-4 Systems) 59 Cutts, D.J., DVB conditional access, Electron., Commn., Engi J., 9(1), pp 21–27, 1997 60 ATSC Standard A/70: Conditional Access System for Terrestrial Broadcast with Amendment, http://www.atsc.org/standards.html, 2004 61 Simitopoulos, D., Zissis, N., Georgiadis, P., Emmanouilidis, V., and Strintzis, M.G., Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD, Multimedia Syst., 9(3), 217–227, 2003 62 Byers, S., Cranor, L., Cronin, E., Kormann, D., and McDaniel, P., Analysis of Security Vulnerabilities in the Movie Production and Distribution Process, in Proceedings of ACM Workshop on Digital Rights Management, 2003 63 The Motion Picture Association’s Role in Digital Cinema, http://www.mpaa.org/ dcinema 64 Korris, J and Macedonia, M., The end of celluloid: Digital cinema emerges, Computer, 35(4), 96–98, 2002 65 Lubell, P.D., A coming attraction: Digital cinema, IEEE Spectrum, 37(3), 72–78, 2000 66 Camp, L.J., DRM: Doesn’t Really Mean Digital Copyright Management, in Proceedinss of the 9th ACM Conference on Computers and Communications Security, 2002, pp 78–87 67 The Digital Object Identifiers, http://www.doi.org/ 787 Index A AAP See Association of American Publishers Access control lists, 34 Access keys, secure distribution of, 12 Adaptive filtering topology, 71 ADSL See Asymmetric Digital Subscriber Line Adult image filtering, 715–732 content filtering, image categorization and, 720 experimental results, 727–730 image detection, 726–727 internet safety, 715–732 multimedia filtering approaches, 720–722 paper objective, 72–723 skin detection, 723–726 first-order model, 725–726 methodology, 723–725 notations, 723–725 structure of system, 723 Advanced encryption standard, 96, 99–103 AES decryption, 102–103 AES encryption, 99–101 AES key schedule, 101–102 Advanced Television Systems Committee, 15 Aegis, by Maples and Spanos, 1995, 110–111 AES See Advanced Encryption Standard AFMA See American Film Marketing Association American Film Marketing Association, 10 Analog copy protection methods, Analog recording, characteristics of, Anticollusion fingerprinting for multimedia, 594–596 Architectural works copyright protection extended to, Association of American Publishers, 10 Asymmetric cipher, 135 Asymmetric detectors, 67 Asymmetric Digital Subscriber Line, ATSC See Advanced Television Systems Committee Attacker choices, secure detector structure, 88–90 Audio quality layers, hearable frequency spectrum, 129–130 Audio robust identification, watermarking/ fingerprinting, 261–282 audio/speech encryption techniques, 127–130 audio fingerprint definition, 263–264 audio fingerprinting parameters, 265–266 fingerprints, watermarks, compared, 278–280 Philips audio fingerprinting, 266–278 extraction algorithm, 267–270 false-positive analysis, 270–273 guiding principles, 266–267 search algorithm, 273–278 Audio signals, blind pattern matching, 562–569 Audio/speech encryption techniques, 29–130, 127–130 audio fingerprint definition, 263–264 audio fingerprinting parameters, 265–266 G.723.1 Speech Codec by Wu and Kuo, 2000, selective encryption algorithm for, 128 MP3 Security Methods by Thorwirth, Horvatic, Weis, and Zhao, 2000, 129–130 Perception-Based Partial Encryption Algorithm by Servetti and De Martin, 2002, 128–129 789 Index Audio watermarking, high-capacity real-time, with perfect correlation sequence, repeated insertion, 283–310 Audio watermarking real-time, high-capacity, perfect correlation sequence/repeated insertion, 283–310 experimental results, 294–308 experimental audio clip, PN binary data profiles, 297–298 using perfect sequences, 298–299 using uniformly redundant array, 299–303 proposed watermarking technique, 291–294 audio similarity measure, 293–294 watermark embedding, 291 watermark extraction, 291–292 zero sidelobe, sequences with autocorrelation of, 286–291 correlation properties, 287 correlation property, 289–291 perfect sequences, 286–288 product theorem, 287–288 synthesis of perfect sequences, 286–287 synthesis of URAs, 289 uniformly redundant array, 288–291 AudioFlatness, 266 Audiovisual works, copyright, Australian Copyright Amendment Digital Agenda Act 2000, 772 Authentication, 529–672 See also under specific technique digital watermarking, 391 integrity, entity authentication, contrasted, 624 scalable image, 605–628 signature-based, 629–672 tree-based signatures, 35 Avalanche property, loss of, 137–138 B Benchmarking, digital watermarking, 249–250 Berne Convention, 8, 49 United States joins, Binary images, watermarking for, 415–419 exterior watermark embedding methods, 417–419 790 interior watermark embedding methods, 416–417 Bit coding space division, multibit watermarking, 244 Bit Recirculation Image Encryption, 152 Bit selection order, 119 Blind detector, 223 Blind pattern matching, 549–576 attack steps, 559–562 algorithm A0, 560 algorithm A1, 560–561 algorithm A2, 561–562 block substitution, 562 computing replacement, 559–562 search for substitution base, 559 signal partitioning, 559 attacking multimedia protection systems with, 549–576 audio signals, 562–569 analysis of similarity function, 564–567 audio processing for BPM attack, 562–563 effect of attack on watermark detection, 567–569 images, 569–573 image processing for BPM attack, 569–671 watermark detection, effect of attack on, 571–573 logistics, 557–559 attack trade-offs, 558 rationale, 555–557 survey, attacks on content protection systems, 553–555 target, 549–553 attacking arbitrary content protection systems, 553 content screening, 550–551 fingerprinting, 551–552 Blind watermark detection, 242 Blind watermark embedding, 241 Blind watermarking, 395 Block ciphers, 135 Books, losses due to piracy, 11 BRIE See Bit Recirculation Image Encryption Broadcast channel environment, digital media fingerprinting, 596–599 anticollusion fingerprinting for multimedia, 594–596 chameleon cipher, 598–599 projective geometric codes, 592–594 solution, 599–601 Index Broadcast encryption, 707–708 Broadcast flag, 21, 705–707 Broadcast monitoring, digital watermarking, 257 Brussels Convention Relating to Distribution of Programme-Carrying Signals Transmitted by Satellite, 49 Brute force attack, 98 BSA See Business Software Alliance Bulky data, slow speed, trade-off between, 135–136 Business models, 50–53 Business Software Alliance, 10 Business software applications, losses due to piracy, 11 C Cable, security, 18–21 Capability certificates, 34 Captioning See Labeling Categories of copyrightable, not copyrightable items, Centralized group control, 30 Centralized Tree-Based Key Management, 32 Chameleon cipher, 598–599 Chaos-based encryption for digital images, videos, 133–168 chaos-based image, video encryption, 147–156 chaos-based video encryption, 154–156 chaos-based watermarking, 154 fractallike curves, image encryption schemes based on, 149–151 joint image, video encryption schemes, 142–143 selective encryption, 140–142 special features, 138–139 survey, 139–147 two-dimensional chaotic maps, image encryption schemes based on, 147–149 generic video encryption schemes, 146–147 MPEG encryption schemes, 145–146 video encryption schemes, 145–147 Yen et al.’s image encryption schemes, 151–153 Chaos-based watermarking, 154 Chaotic Key-Based Algorithm, 152 Chaotic Neural Network for Signal Encryption, 153 Chaotic Video Encryption Scheme, 155–156 Cheng and Li, Partial Encryption Algorithms by, 124126 Chiaraluce et al., chaos-based H.263ỵ encryption scheme, 154155 Choreographic works, copyright, Chosen-ciphertext attack, 99, 135 Chosen-plaintext attack, 98–99, 135 Cipher, encryption, decryption of, 135 Cipher block chaining, 209 Ciphertext, 12 Ciphertext-only attack, 98, 135 CKBA See Chaotic Key-Based Algorithm Clustered schemes, 30 CNNSE See Chaotic Neural Network for Signal Encryption Code division, multibit watermarking, 244 Collusion attack, 552, 577 Communication, watermarking as, 224 Complete authentication, 636 Compressed domain audio, 108 speech, 107 Computational number, theoretic schemes, 30 Computer programs, copyright law amended regarding, Computer Science and Telecommunications Board, 11 ‘‘Digital Dilemma — Intellectual Property in Information Age,’’ 11 Conditional access systems, 14 Confidentiality defined, 96 multicast data, 29 Confusion matrix, evaluation, 728 Connection-oriented protocol, connectionless, distinguished, 28 Consumer Broadband and Digital Television Promotion Act, 50, 772 Consumer devices, digital rights management, 691–714 advanced broadcast encryption, 707–708 broadcast flag, 705–707 content scrambling system, 695–697 digital transmission content protection, 701–704 DIVX, 700–701 high definition content protection, 704–705 791 Index Consumer devices, digital rights management (Continued) macrovision, 692–693 personal digital domain, 708–712 recordable media, content protection on, 697–700 serial copy management system, 693–695 Consumer Electronics Association, 15, 45 ‘‘Consumers, Schools, and Libraries Digital Rights Management Awareness Act of 2003’’ bill, draft legislation, 50 Content authentication, digital watermarking, 255–256 Content Protection System Architecture, 42 Content scrambling system, 695–697 Content streaming, defined, 651–652 Content transformation, various domains, 652 Context-based arithmetic coding, discrete wavelet transform, 143 Continuous-tone watermarking techniques, 402–408 robust watermark structure, 402–403 RST robust watermarking, 403–408 Contrast masking, 442 Conversational multimedia scenario, 174–175 Copy protection, digital watermarking, 253–254 Copy Protection Technical Working Group, 15 Copy Protection Technologies CPT subgroup of technical module, 45 Copyright defined, 6–9 derivation of term, limitations on rights provided by, notable dates in U.S history of, securing of, timing, Copyright Industries in U.S Economy, 10 Copyright law codified as Title 17 of U.S Code, 6, first revision of, fourth revision of, international, second revision of, third revision of, Copyright piracy, trade losses due to, 11 Copyright system in Library of Congress, centralization of, Copyright Treaty, World Intellectual Property Organization, 49, 772 792 Copyrightable, not copyrightable items, categories of, Copyrighted digital content, legal means of protecting, 49 Correlation-based detectors, 65–67 Corrupted watermarked cover, 223 Countermeasures, 170–171 Cover work, 222 CPTW See Copy Protection Technical Working Group Creative art, 280 Cryptanalysis, 98–99 Crypto hash, 631 Crypto signatures, 632 Cryptographic techniques, video digital rights management, 773–774 CSTB See Computer Science and Telecommunications Board CTKM See Centralized Tree-Based Key Management Current detection algorithms, 65–69 asymmetric detectors, 67 correlation-based detectors, 65–67 quantization-based detector, 67–69 quantized index modulation, 67–68 quantized projection watermarking, 68–69 CVES See Chaotic Video Encryption Scheme D DACA See Australian Copyright Amendment Digital Agenda Act 2000 DARPA See Defense Advance Research Projects Agency Data embedding, 473–475 Data encryption key, 39 Data Encryption Standard, 96 Data hiding, 529–672 digital watermarking, 392 lossless, 531–548 categories, 533–541 for fragile authentication, 533–535 for high embedding capacity, 535–538 for semifragile authentication, 538–541 watermarking, 742–747 selecting regions for watermarking, 743 watermark detection, 746–747 watermark embedding, 743–746 Index Data rate controller, reversible watermarks, 512 Data source authentication, 34–35 multicast, 29 Decision boundary, modifying, 96 DeCSS, software utility, 42 Defense Advance Research Projects Agency, 28 Degradation See Light encryption Delayed rekeying, 40 DES, Data Encryption Standard, 96 Desynchronization attacks, 554, 582 Detection algorithms, 65–69 asymmetric detectors, 67 correlation-based detectors, 65–67 quantization-based detector, 67–69 quantized index modulation, 67–68 quantized projection watermarking, 68–69 Detector structure, secure, 84–90 algorithm, 84, 87–88 attacker choices, 88–90 fractal generation, 85 modifying decision boundary, 85–86 practical implementation, 86–87 Diagonal edge, 441 Difference expansion, reversible watermarks, 493–528 comparison with other algorithms, 522–524 cross-color embedding, 513–514, 519–522 decoding, 482–484 definition, 506–507 difference expansion, 505–506 dyad-based GRIT, 500–501 embedding, 505–507 experimental results, 515–524 generalized reversible integer transform, 498–505 LSB embedding in GRIT domain, 506 payload size, 510–512 quad-based GRIT, 503–505 recursive, cross-color embedding, 513–514 recursive embedding, 513–514 spatial quads, 517–519 spatial triplets, 515–517 translation registration, decoding, 482–484 vector definition, 498–499 Diffie-Hellman method message sequence chart for, 184 multimedia internet keying, 183–184 Digital asset management, 681–682 Digital Audio Home Recording Act, Digital cinema, digital rights management, 782–784 Digital content, copyrighted, legal means of protecting, 49 Digital data stream encryption, 209–211 ‘‘Digital Dilemma — Intellectual Property in Information Age,’’ Computer Science and Telecommunications Board, 11 Digital home networks, security in, 41–45 Digital media fingerprinting, 577–604 attacks, 582–586 multimedia collusion, 583–586 notation, 582–583 single-user attacks, 582 in broadcast channel environment, 596–599 anticollusion fingerprinting for multimedia, 594–596 chameleon cipher, 598–599 projective geometric codes, 592–594 solution, 599–601 figures of merit, 599–600 fingerprinting code, 578–580 definitions, 578–580 previous work on, 586–599 limitations, 589 symmetric fingerprinting through intermediaries, 587–589 symmetric fingerprinting via data embedding, 589–596 problem, 586 smart card fingerprinting system, 600–601 watermarking scheme, 580–581 definitions, 580–581 Digital Millennium Copyright Law, 9, 49, 772 Digital photographic image, credibility problems, 623 Digital rights, association with content, 13 Digital rights management, 14, 682 consumer devices, 691–714 advanced broadcast encryption, 707–708 broadcast flag, 705–707 content scrambling system, 695–697 digital transmission content protection, 701–704 DIVX, 700–701 high definition content protection, 704–705 793 Index Digital rights management (Continued) macrovision, 692–693 personal digital domain, 708–712 recordable media, content protection on, 697–700 serial copy management system, 693–695 video, 759–788 asset management, 763–764 business aspect, 769–771 consumers, 769 content declarations, 778 creators, 766 cryptographic techniques, 773–774 digital cinema, 782–784 digital video broadcasts, 780–781 digital video delivery, 763–764 distributors, 768–769 legal aspect, 771–772 owners, 766–767 pay-per-usage, 770 pay-per-usage-per usage constrained, 770 preview, 770 purchase, 770 rights languages, 777–778 rights requirements, 764–769 social aspect, 771 storage, 763 stored media, 781–782 subscription based, 770 technical aspect, 772–784 trading protocols, 776–777 usage controls, 764 watermarking techniques, 775–776 Digital signature technique, 618 Digital systems, universe of, 13 Digital transmission content protection, 701–704 Digital video, credibility problems, 623 Digital Video Broadcasting, 17 Digital video broadcasts, video digital rights management, 780–781 Digital video delivery, 763–764 Digital watermarking, 675–690 algorithm parameters, 683–686 annotation, 678 applications, 677–683 authentication, 680 broadcast, internet, 679–680 for broadcast monitoring, 257 classification of applications, 251 classifications, 676–677 794 for content authentication, 255–256 copy protection, 679 for copy protection, 253–254 copyright communication, 678 copyright protection, 251–253, 391 for copyright protection, 251–253 digital asset management, 681–682 digital rights management, 682 electronic content management, 681–682 filtering, classification, 680 for fingerprinting, 254–255 forensic tracking, 681 framework, 675–690 granularity, 685–686 integrity, 681 linking, E-commerce, 683 parameter evaluation, 686 parameter requirements, 686–688 payload size, 685 perceptibility, 684 performance, 684 printed materials, 387–436 reliability, false positives, 685 remote triggering, 683 robustness, 684–685 for system enhancement, 257–258 workflow, 688 Digital watermarking applications, 250–258 Digital watermarking techniques, 222–250 communication, watermarking as, 224 digital watermarking systems, 222–223 embedding one bit in spatial domain, 224–227 informed coding, 235–238 informed embedding, 233–235 multibit payload, 238–239 patchwork, spatial domain watermarking technique, 227–228 in transform domains, 228–233 in DCT domain, 229–230 in DFT domain, 231–232 spread spectrum technique, 229–230 in wavelet domain, 230–231 Digital watermarking technology new trends, printed materials, 387–436 printed materials, 387–436 about current mobile market, 419–420 administration of watermarking technology, 397 advertisers, 422–423 applications of digital watermarking, 390–392 authentication, 391 Index for binary images, 415–419 blind, nonblind watermarking, 395 capability, 393–394 challenges to watermarking by using mobile cameras, 426–429 classifications of digital watermarking, 394–396 continuous-tone watermarking techniques, 402–408 copyright protection, 391 data hiding, 392 digital watermarking system, 389 exterior watermark embedding methods, 417–419 extracting watermark using mobile cameras, 419–429 features of digital watermarking, 392–394 frequency domain watermarking, 390 generalized scheme for watermark embedding, 390 halftone image watermarking techniques, 408–413 for halftone images, 410–413 halftoning technique, defined, 408–410 imperceptibility, 392 interior watermark embedding methods, 416–417 limitation of watermarking technology, 397 mobile phone, 420–422 printed images, 399 for printed images, 400–402 printed textual images, 400 for printed textual images, 413–414 problems of watermarking for printed images, 400–401 public, private watermarking, 396 reversible, inseparable watermarking, 395–396 robust, fragile watermarking, 395 robust watermark structure, 402–403 robustness, 392–393 roles of watermarking printed for textual images, 413–414 RST robust watermarking, 403–408 spatial-domain watermarking, 389–390 standardization of watermarking technology, 397–398 for text documents, 414–415 watermarking scheme, 424–425 watermarking system, 425–426 Direct message coding, multibit watermarking, 244 Discrete wavelet transform, 143 context-based arithmetic coding, 143 Distributed watermarking, 37 watercasting, 37 Distribution networks, protection of multimedia content in, 3–62 business models, 50–53 cable, security, 18–21 copyright, defined, 6–9 digital home networks, security in, 41–45 internet distribution security in DRM systems for, 21–24 security in multicast systems for, 23–41 wired network security, 30–38 wireless network security, 38–41 legal solutions, 45–50 satellite, security, 18–21 technical solutions, 12–45 terrestrial distribution, security, 18–21 U.S copyright industries, 9–12 DIVX, 700–701 Doctrine of ‘‘fair use,’’ 6–7 Domain Key Distributor, 39 Domino Signal Encryption Algorithm, 153 Dramatic compositions, added to protected works, Dramatic works, including accompanying music, copyright, Droogenbroeck and Benedett, 2002 encryption methods, 126–127 Raster, JPEG Images, selective encryption methods for, 126–127 DSEA See Domino Signal Encryption Algorithm DVB See Digital Video Broadcasting DVB Content Protection & Copy Management CPCM system, 45 DVB Digital Video Broadcasting, 17 DVD Forum, originally known as DVD Consortium, 15 DWT See Discrete wavelet transform E ECMs See Entitlement Control Messages Economic impact of piracy, 11–12 Economy importance of copyright industries, 10–11 Embedding distortion, 223 795 Index Embedding one bit in spatial domain, digital watermarking techniques, 224–227 Embedding reversible watermark, 508–509 EMMs See Entitlement Management Messages Encryption, 93–218 compression, trade-off between, 136 dependence on compression, 136 streaming media, 197–218 challenges, 200–205 digital data stream encryption, 209–211 dynamic network challenge, 204 enabling transcoding without decryption, 211–212 encryption in RTP, 206–207 loss resilient scalability, 213–215 PGS streaming media encryption algorithm, 212–213 potential bit-rate increase, 201–202 potential cost increase, 201 protocol, 200 rate variation challenge, 202–204 real-time constraint, 200–201 sample streaming media encryption system, 207–209 scalable streaming media encryption, 209–215 streaming media, defined, 198 streaming media system, 198–200 transcoding challenge, 204–205 vs authentication, 624–625 Encryption security, 598 Encryption standard, 99–103 Encryption techniques, 95–132 advanced encryption standard, 99–103 AES decryption, 102–103 AES encryption, 99–101 AES key schedule, 101–102 audio/speech encryption techniques, 29–130 G.723.1 Speech Codec by Wu and Kuo, 2000, selective encryption algorithm for, 128 MP3 Security Methods by Thorwirth, Horvatic, Weis, and Zhao, 2000, 129–130 Perception-Based Partial Encryption Algorithm by Servetti and De Martin, 2002, 128–129 cryptanalysis, 98–99 image encryption techniques, 124–127 796 Partial Encryption Algorithms by Cheng and Li, 2000, 124–126 Selective Bitplane Encryption Algorithm by Podesser, Schmidt, and Uhl, 2002, 127 selective encryption methods for Raster and JPEG Images by Droogenbroeck and Benedett, 2002, 126–127 modern cryptography, overview, 96–103 multimedia security, 103–105 public key cryptosystems, 97–98 symmetric key cryptosystems, 96–97 video encryption techniques, 105–124 Aegis by Maples and Spanos, 1995, 110–111 Format-Compliant Configurable Encryption by Wen et al., 2002, 123 MHT-Encryption Scheme and MSI-Coder by Wu and Kuo, 2000 and 2001, 121–123 Partial Encryption Algorithms for Videos by Cheng and Li, 2000, 120–121 SECMPEG by Meyer and Gadegast, 1995, 109–110 Selective Scrambling Algorithm by Zeng and Lei, 2002, 123–124 selective video encryption, 105–124 Video Encryption Algorithm by Qiao and Nahrstedt, 1997, 112–115 Video Encryption Algorithms by Shi, Wang, and Bhargava, 1998 and 1999, 115–118 Video Encryption Methods by Alattar, Al-Regib, and Al-Semari, 1999, 119–120 video scrambling, 105 Zigzag Permutation Algorithm by Tang, 1996, 111–112 Encryptionite system, illustration, 208 End-to-end protection system, fundamental problem in, 17 End-to-end security, from source to final destination, requirements for, 3–57 English copyright law first copyright law, derived from, Entertainment software, losses due to piracy, 11 Entertainment Software Association, 10 Entitlement Control Messages, 18 Entitlement Management Messages, 18–19 Index Entity authentication, integrity authentication, contrasted, 624 Entropy codec, video, 107 Error tolerability, 139 ESA See Entertainment Software Association Evaluation confusion matrix, 728 Experimental verification, 280 Extensible Markup Language, 776 Extensible Markup Language documents, 776 EXtensible rights Markup Language, 14 Extracting watermark using mobile cameras F Fair use doctrine, 6–7 False-negative errors, 226 False-positive errors, 226 File sharing, 51 Filtering, image, for internet safety, 715–732 Filtering of images, adult, 715–732 adult image detection, 726–727 content filtering, image categorization and, 720 experimental results, 727–730 multimedia filtering approaches, 720–722 paper objective, 72–723 skin detection, 723–726 first-order model, 725–726 methodology, 723–725 notations, 723–725 structure of system, 723 Fingerprint size, 265 Fingerprint streams, 267 Fingerprintblock, 267 Fingerprinting, 255, 529–672 audio, robust identification, 261–282 digital media, 577–604 anticollusion fingerprinting for multimedia, 594–596 attacks, 582–586 in broadcast channel environment, 596–599 chameleon cipher, 598–599 definitions, 578–581 figures of merit, 599–600 fingerprinting code, 578–580 limitations, 589 multimedia collusion, 583–586 notation, 582–583 previous work on, 586–599 problem, 586 projective geometric codes, 592–594 single-user attacks, 582 smart card fingerprinting system, 600–601 solution, 599–601 symmetric fingerprinting through intermediaries, 587–589 symmetric fingerprinting via data embedding, 589–596 watermarking scheme, 580–581 digital watermarking, 254–255 robust identification of audio using, 261–282 Fingerprints, watermarks, compared, 278–280 First copyright law, statute of Anne, derived from English copyright law, common law enacted under new constitution, Flat schemes, 30 Floyd and Steinberg filter, 410 Forensic tracking, digital watermarking, 681 Format-Compliant Configurable Encryption, by Wen et al., 2002, 123 Forward secure signatures, 620 Four-dimensional pseudorandom sequences, mapping user’s message into, 317–318 Fractal generation, secure detector structure, 85 Fractallike curves, image encryption schemes based on, 149–151 Fragile authentication, 636 lossless data hiding, 533–535 Fragile watermarking, 395 image authentication, 359–386 attacks/countermeasures, 378–384 conventional watermarking, 362–365 estimation, set of keys, 382–384 ill-posed operator, secure image authentication, 365–378 singular-value decomposition and linear ill-posed operators, 366–367 stego image attack, 384 swapping attack, 381 vector quantization attack, 378–381 verification procedure, 373–378 watermark generation, 367–368 watermarking process, 368–373 for image authentication, 359–386 swapping attack, cropping, 381–382 797 Index Fragile watermarks, 256 Frequency division, multibit watermarking, 244 Frequency domain image, 106 video, 106 Frequency domain watermarking, 390 watermark embedding, 472–478 watermark extraction with resynchronization, 479–484 JPEG compression, image watermarking robust to, 467–492 Granularity, 265 Graphic works, copyright, Group authentication, 35 Group signatures, 620 G G.723.1 Speech Codec by Wu and Kuo, 2000, selective encryption algorithm for, 128 Generalized three-dimensional radon transform, 737–738 three-dimensional models, watermarking, indexing, 733–759 Generic attack, 69–84 on linear detectors, 71–76 on QIM scheme, 76–80 on quantization-based schemes, 76–83 on quantized projection scheme, 80–83 Generic framework, for system security evaluation, 666 Geneva Convention for Protection of Producers of Phonograms Against Unauthorized Duplication of Their Phonograms, 49 Geometric attacks, robustness, 751–752 Geometric distortion image watermarking resistant to, 331–358 capacity, 355 complexity, 355 embedding without exact inversion, 355–356 experimental results, 349–352 geometric distortions, 334–342 rotation invariance, 353–355 RST-invariant watermarking method, 342–349 watermark system design, 345–349 watermarking framework, 333–334 image watermarking robust to, JPEG compression, 467–492 message encoding, 472–475 template detection, 479–482 template embedding in DFT domain, 475–478 training sequence embedding in DWT domain, 472–475 translation registration, decoding, 482–484 798 H Halftone image watermarking techniques, 408–413 halftoning technique, defined, 408–410 roles of watermarking printed for textual images, 413–414 watermarking techniques for halftone images, 410–413 watermarking techniques for printed textual images, 414 HCIE See Hierarchical Chaotic Image Encryption Health supervision, 419 Hearable frequency spectrum, audio quality layers, 129–130 Heterogeneous networks security in, intellectual property multimedia, 173 streaming media over, to various devices, layout, 202 Hierarchical Chaotic Image Encryption, 152 Hierarchical key-based schemes, 31 Hierarchical key distribution trees, 31 Hierarchical node-based schemes, 31 Hierarchy of intermediaries watermarking multicast video with, 588 watermarking with, 37–38 High-capacity real-time audio watermarking, perfect correlation sequence/repeated insertion, 283–310 audio similarity measure, 293–294 correlation properties, 287 correlation property, 289–291 experimental audio clip, PN binary data profiles, 297–298 experimental results, 294–308 perfect sequences, 286–288 product theorem, 287–288 proposed watermarking technique, 291–294 ... and index ISBN 0-8493-2773-3 (alk paper) Multimedia systems – Security measures – Handbooks, manuals, etc Intellectual property – Handbooks, manuals, etc I Furht, Borivoje II Kirovski, Darko III... great threat of piracy The purpose of the Multimedia Security Handbook is to provide a comprehensive reference on advanced topics in this field The handbook is intended both for researchers and practitioners... protection of digital multimedia content The handbook can also be used as the textbook for graduate courses in the area of multimedia security The handbook addresses a variety of issues related

Ngày đăng: 12/03/2018, 10:50

Từ khóa liên quan

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan