Abstract
Commutative Watermarking and Encryption (CWE) provides a solution for interoperation between watermarking and encryption. It realizes the challenging operation that embeds a watermark into the encrypted multimedia data directly, which avoids the decryption–watermarking–encryption triples. Till now, few CWE schemes have been reported. They often obtain the commutative property by partitioning multimedia data into independent parts (i.e., the encryption part and the watermarking part). Since the two parts are isolated, it can not keep secure enough against replacement attacks. To avoid the disadvantage, a novel quasi-commutative watermarking and encryption (QCWE) scheme based on quasi-commutative operations is proposed in this paper. In the proposed scheme, the encryption operation and watermarking operation are applied to the same data part. Since the two operations are homogenous with commutative properties, their orders can be commutated. As an example, the scheme for MPEG2 video encryption and watermarking is presented. In this example, the DCs in intra macroblocks are encrypted or watermarked based on random module addition, while the DCs in other macroblocks and all the ACs’ signs are encrypted with a stream cipher or block cipher. Analysis and experiments show that the scheme obtains high perceptual security and time efficiency, and the watermarking and encryption operations can be commutated. These properties make the scheme a suitable choice for efficient media content distribution. Additionally, the paper shows the availability of constructing the commutative watermarking and encryption scheme with homogenous operations, which is expected to activate the new research topic.
Similar content being viewed by others
References
Anderson R, Manifavas C (1997) Chamleon—a new kind of stream cipher. In: lecture notes in computer science, fast software encryption, Springer pp. 107–113
Bloom JA, Cox IJ, Kalker T, Linnartz JP, Miller ML, Traw CB (1999) Copy protection for digital video. Proc IEEE Spec Issue Identif Prot Multimedia Inf 87(7):1267–1276
Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking. Morgan-Kaufmann, San Francisco
Cox I, Kilian J, Leighton F, Shamoon F (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687. doi:10.1109/83.650120
First summary report on hybrid systems. TR: IST-2002-507932, ECRYPT European Network of Excellence in Cryptology, 2005. (http://www.ecrypt.eu.org/documents/)
Furht B, Kirovski D (eds) Multimedia Security Handbook, CRC, December 28, 2004
Golomb SW (1967) Shift Register Sequences, Holden-Day, San Francisco
Hauer E, Thiemert S (2004) Synchronization techniques to detect MPEG video frames for watermarking retrieval. Proc SPIE Secur Watermarking Multimedia Contents IV 5306:315–324
Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441. doi:10.1109/83.826780
Huang J, Shi YQ, Shi Y (2000) Embedding image watermarks in dc components. IEEE Trans Circuits Syst Video Technol 10(6):974–979 Sept
Kundur D, Karthik K (2004) Video fingerprinting and encryption principles for digital rights management. Proc IEEE 92(6):918–932. doi:10.1109/JPROC.2004.827356
Lemma AN, Katzenbeisser S, Celik MU, Veen, MV (2006) Secure Watermark Embedding Through Partial Encryption. Proceedings of International Workshop on Digital Watermarking (IWDW 2006), Springer LNCS, 4283, 433–445
Lian S (2008) Multimedia content encryption: techniques and applications, Auerbach Publications, CRC Press, September
Lian S, Liu Z, Ren Z, Wang H (2006) Commutative watermarking and encryption for media data. Int J Opt Eng 45(8):0805101–0805103
Lian S, Liu Z, Ren Z, Wang H (2006a) Secure advanced video coding based on selective encryption algorithms. IEEE Trans Consum Electron 52(2):621–629. doi:10.1109/TCE.2006.1649688
Lian S, Liu Z, Ren Z, Wang H (2006b) Secure distribution scheme for compressed data streams. 2006 IEEE Conference on Image Processing (ICIP 2006) pp. 1953–1956 Oct
Lian S, Liu Z, Ren Z, Wang H (2007a) Joint fingerprint embedding and decryption for video distribution. 2007 IEEE Conference on Multimedia and Expo (ICME2007), pp. 1523–1526
Lian S, Liu Z, Ren Z, Wang H (2007b) Commutative encryption and watermarking in compressed video data. IEEE Circuits Syst Video Technol 17(6):774–778. doi:10.1109/TCSVT.2007.896635
Lin EI, Eskicioglu AM, Lagendijk RL, Delp EJ (2005) Advances in digital video content protection. Proc IEEE 93(1):171–183. doi:10.1109/JPROC.2004.839623
Mao Y, Wu M (2006) A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans Image Process 15(7):2061–2075. doi:10.1109/TIP.2006.873426
Mollin RA (2006) An introduction to cryptography. CRC, New York
Moulin P, Koetter R (2005) Data-hiding codes. IEEE Proc 93(12):2083–2126. doi:10.1109/JPROC.2005.859599
MPEG2 (1994) ISO/IEC IS 13818-2, compression codec for interlaced and non-interlaced video signals
Petitcolas FAP, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems. In: David Aucsmith (ed) Second International Workshop on Information Hiding (IH’98), USA, LNCS 1525:219–239 April
Qao L, Nahrstedt K (1997) A new algorithm for MPEG video encryption. In Proceeding of the First International Conference on Imaging Science, Systems and Technology (CISST’97). Las Vegas, Nevada pp 21–29 July
Simitopoulos D, Zissis N, Georgiadis P, Emmanouilidis V, Strintzis MG (2003) Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. ACM Multimedia Syst J Spec Issue Multimedia Secur 9(3):217–227
Shi C, Bhargava B (1998) A fast MPEG video encryption algorithm. In Proceedings of the 6th ACM International Multimedia Conference. Bristol, UK pages 81–88 September
Tosun AS, Chi Feng W (2002) Secure video transmission using proxies. In Technical Report, Computer and Information Science, Ohio State University
Uehara T, Safavi-Naini R, Ogunbona P, Recovering DC (2006) Coefficients in block-based DCT. IEEE Trans Image Process 15(11):3592–3596. doi:10.1109/TIP.2006.881939
Wang S, Kuang J, Li J (2002) Chaos-based communication in a large community. Phys Rev 66(6):1–4
Wang Y, Pearmain A (2006) Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain. IEEE Trans Image Process 15(6):1536–1543. doi:10.1109/TIP.2006.873476
Wu T, Wu S (1997) Selective encryption and watermarking of MPEG video. International Conference on Image Science, Systems and Technology, CISST’97, LA, USA, Feb
Yeung SF, John CS, David L, Yau KY (2002) A Case for a Multi-Key Secure Video Proxy: Theory, Design and Implementation. ACM Multimedia Conference, Juan-les-Pins, France, December 1–6
Yeung SF, John CS, David L, Yau KY (2005) A Multi-key Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation. IEEE Trans Multimed 7(2).. doi:10.1109/TMM.2005.843361
Zeng W, Lei S (2003) Efficient frequency domain selective scrambling of digital video. IEEE Trans on Multimedia 5(1):118–129 March
Zeng W, Liu B (1999) A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images. IEEE Trans Image Process 8(11):1534–1548. doi:10.1109/83.799882
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lian, S. Quasi-commutative watermarking and encryption for secure media content distribution. Multimed Tools Appl 43, 91–107 (2009). https://doi.org/10.1007/s11042-008-0258-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-008-0258-4