Skip to main content
Log in

Quasi-commutative watermarking and encryption for secure media content distribution

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Commutative Watermarking and Encryption (CWE) provides a solution for interoperation between watermarking and encryption. It realizes the challenging operation that embeds a watermark into the encrypted multimedia data directly, which avoids the decryption–watermarking–encryption triples. Till now, few CWE schemes have been reported. They often obtain the commutative property by partitioning multimedia data into independent parts (i.e., the encryption part and the watermarking part). Since the two parts are isolated, it can not keep secure enough against replacement attacks. To avoid the disadvantage, a novel quasi-commutative watermarking and encryption (QCWE) scheme based on quasi-commutative operations is proposed in this paper. In the proposed scheme, the encryption operation and watermarking operation are applied to the same data part. Since the two operations are homogenous with commutative properties, their orders can be commutated. As an example, the scheme for MPEG2 video encryption and watermarking is presented. In this example, the DCs in intra macroblocks are encrypted or watermarked based on random module addition, while the DCs in other macroblocks and all the ACs’ signs are encrypted with a stream cipher or block cipher. Analysis and experiments show that the scheme obtains high perceptual security and time efficiency, and the watermarking and encryption operations can be commutated. These properties make the scheme a suitable choice for efficient media content distribution. Additionally, the paper shows the availability of constructing the commutative watermarking and encryption scheme with homogenous operations, which is expected to activate the new research topic.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Anderson R, Manifavas C (1997) Chamleon—a new kind of stream cipher. In: lecture notes in computer science, fast software encryption, Springer pp. 107–113

  2. Bloom JA, Cox IJ, Kalker T, Linnartz JP, Miller ML, Traw CB (1999) Copy protection for digital video. Proc IEEE Spec Issue Identif Prot Multimedia Inf 87(7):1267–1276

    Google Scholar 

  3. Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking. Morgan-Kaufmann, San Francisco

    Google Scholar 

  4. Cox I, Kilian J, Leighton F, Shamoon F (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687. doi:10.1109/83.650120

    Article  Google Scholar 

  5. First summary report on hybrid systems. TR: IST-2002-507932, ECRYPT European Network of Excellence in Cryptology, 2005. (http://www.ecrypt.eu.org/documents/)

  6. Furht B, Kirovski D (eds) Multimedia Security Handbook, CRC, December 28, 2004

  7. Golomb SW (1967) Shift Register Sequences, Holden-Day, San Francisco

  8. Hauer E, Thiemert S (2004) Synchronization techniques to detect MPEG video frames for watermarking retrieval. Proc SPIE Secur Watermarking Multimedia Contents IV 5306:315–324

    Google Scholar 

  9. Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441. doi:10.1109/83.826780

    Article  Google Scholar 

  10. Huang J, Shi YQ, Shi Y (2000) Embedding image watermarks in dc components. IEEE Trans Circuits Syst Video Technol 10(6):974–979 Sept

    Article  Google Scholar 

  11. Kundur D, Karthik K (2004) Video fingerprinting and encryption principles for digital rights management. Proc IEEE 92(6):918–932. doi:10.1109/JPROC.2004.827356

    Article  Google Scholar 

  12. Lemma AN, Katzenbeisser S, Celik MU, Veen, MV (2006) Secure Watermark Embedding Through Partial Encryption. Proceedings of International Workshop on Digital Watermarking (IWDW 2006), Springer LNCS, 4283, 433–445

  13. Lian S (2008) Multimedia content encryption: techniques and applications, Auerbach Publications, CRC Press, September

  14. Lian S, Liu Z, Ren Z, Wang H (2006) Commutative watermarking and encryption for media data. Int J Opt Eng 45(8):0805101–0805103

    Google Scholar 

  15. Lian S, Liu Z, Ren Z, Wang H (2006a) Secure advanced video coding based on selective encryption algorithms. IEEE Trans Consum Electron 52(2):621–629. doi:10.1109/TCE.2006.1649688

    Article  Google Scholar 

  16. Lian S, Liu Z, Ren Z, Wang H (2006b) Secure distribution scheme for compressed data streams. 2006 IEEE Conference on Image Processing (ICIP 2006) pp. 1953–1956 Oct

  17. Lian S, Liu Z, Ren Z, Wang H (2007a) Joint fingerprint embedding and decryption for video distribution. 2007 IEEE Conference on Multimedia and Expo (ICME2007), pp. 1523–1526

  18. Lian S, Liu Z, Ren Z, Wang H (2007b) Commutative encryption and watermarking in compressed video data. IEEE Circuits Syst Video Technol 17(6):774–778. doi:10.1109/TCSVT.2007.896635

    Article  Google Scholar 

  19. Lin EI, Eskicioglu AM, Lagendijk RL, Delp EJ (2005) Advances in digital video content protection. Proc IEEE 93(1):171–183. doi:10.1109/JPROC.2004.839623

    Article  Google Scholar 

  20. Mao Y, Wu M (2006) A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans Image Process 15(7):2061–2075. doi:10.1109/TIP.2006.873426

    Article  Google Scholar 

  21. Mollin RA (2006) An introduction to cryptography. CRC, New York

    Google Scholar 

  22. Moulin P, Koetter R (2005) Data-hiding codes. IEEE Proc 93(12):2083–2126. doi:10.1109/JPROC.2005.859599

    Article  Google Scholar 

  23. MPEG2 (1994) ISO/IEC IS 13818-2, compression codec for interlaced and non-interlaced video signals

  24. Petitcolas FAP, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems. In: David Aucsmith (ed) Second International Workshop on Information Hiding (IH’98), USA, LNCS 1525:219–239 April

  25. Qao L, Nahrstedt K (1997) A new algorithm for MPEG video encryption. In Proceeding of the First International Conference on Imaging Science, Systems and Technology (CISST’97). Las Vegas, Nevada pp 21–29 July

  26. Simitopoulos D, Zissis N, Georgiadis P, Emmanouilidis V, Strintzis MG (2003) Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. ACM Multimedia Syst J Spec Issue Multimedia Secur 9(3):217–227

    Google Scholar 

  27. Shi C, Bhargava B (1998) A fast MPEG video encryption algorithm. In Proceedings of the 6th ACM International Multimedia Conference. Bristol, UK pages 81–88 September

  28. Tosun AS, Chi Feng W (2002) Secure video transmission using proxies. In Technical Report, Computer and Information Science, Ohio State University

  29. Uehara T, Safavi-Naini R, Ogunbona P, Recovering DC (2006) Coefficients in block-based DCT. IEEE Trans Image Process 15(11):3592–3596. doi:10.1109/TIP.2006.881939

    Article  Google Scholar 

  30. Wang S, Kuang J, Li J (2002) Chaos-based communication in a large community. Phys Rev 66(6):1–4

    MATH  Google Scholar 

  31. Wang Y, Pearmain A (2006) Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain. IEEE Trans Image Process 15(6):1536–1543. doi:10.1109/TIP.2006.873476

    Article  Google Scholar 

  32. Wu T, Wu S (1997) Selective encryption and watermarking of MPEG video. International Conference on Image Science, Systems and Technology, CISST’97, LA, USA, Feb

  33. Yeung SF, John CS, David L, Yau KY (2002) A Case for a Multi-Key Secure Video Proxy: Theory, Design and Implementation. ACM Multimedia Conference, Juan-les-Pins, France, December 1–6

  34. Yeung SF, John CS, David L, Yau KY (2005) A Multi-key Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation. IEEE Trans Multimed 7(2).. doi:10.1109/TMM.2005.843361

  35. Zeng W, Lei S (2003) Efficient frequency domain selective scrambling of digital video. IEEE Trans on Multimedia 5(1):118–129 March

    Article  Google Scholar 

  36. Zeng W, Liu B (1999) A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images. IEEE Trans Image Process 8(11):1534–1548. doi:10.1109/83.799882

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiguo Lian.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lian, S. Quasi-commutative watermarking and encryption for secure media content distribution. Multimed Tools Appl 43, 91–107 (2009). https://doi.org/10.1007/s11042-008-0258-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-008-0258-4

Keywords

Navigation