Abstract
In this paper, we propose a new encryption method for intellectual property rights management of MPEG-4 coder. DCT coefficients and motion vectors (MVs) are used for the combination encryption of the MPEG-4 video. Experimental results indicate that the proposed joint and partial encryption technique provides levels of security and achieves a simple and coding-efficient architecture with no adverse impact on error resilience.
This research was supported by Seoul Future Contents Convergence (SFCC) Cluster established by Seoul Industry-Academy-Research Cooperation Project.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Schneier, B.: Applied cryptography. Wiley and Sons, Chichester (1996)
Piva, A., Bartolini, F., Barni, M.: Managing copyright in open networks. IEEE Internet Computing 6, 18–26 (2002)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding: a survey. Proceedings of the IEEE 87, 1062–1078 (1999)
Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proc. ACM Multimedia, vol. 96, pp. 219–230 (1996)
Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. on Multimedia 5, 118–129 (2003)
Cox, I.J., Miller, M.L., Bloom, J.A.: Watermarking applications and their properties. In: Proc. IEEE International Conference on Information Technology. Coding and Computing, pp. 6–10 (2000)
Khan, J.Y., Das, P.: MPEG4 Video over Packet Switched Connection of the WCDMA Air Interface. In: Proc. of the 13th IEEE International Symposium on Personal Indoor and Mobile Radio Communications, vol. 5, pp. 2189–2193 (2002)
Gall, D.L.: MPEG: a video compression standard for multimedia applications. Communications of the ACM 34, 46–58 (1991)
Spanos, G., Maples, T.: Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-time Video. In: Proceedings of 4th International Conference on Computer Communications and Networks (1995)
Agi, I., Gong, L.: An Empirical Study of Mpeg Video Transmissions. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp. 137–144 (1996)
Qiao, L., Nahrstedt, K.: A New Algorithm for MPEG Video Encryption. In: Proceedings of The First International Conference on Imaging Science, Systems, and Technology (CISST 1997), pp. 21–29 (1997)
Qiao, L., Nahrstedt, K.: Comparison of MPEG encryption algorithms. Computers and Graphics 22, 437–448 (1998)
Kwon, G.-R., Lee, T.-Y., Kim, K.-H., Jin, J.-D., Ko, S.-J.: Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS, vol. 3802, pp. 1098–1103. Springer, Heidelberg (2005)
EPIC(Electronic Privacy Information Center) Digital Right Management and Privacy Page, http://www.epic.org/privacy/drm/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwon, GR., Lee, KH., Nam, SJ., Ko, SJ. (2006). Intellectual Property Rights Management Using Combination Encryption in MPEG-4. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_16
Download citation
DOI: https://doi.org/10.1007/11922841_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48825-5
Online ISBN: 978-3-540-48827-9
eBook Packages: Computer ScienceComputer Science (R0)