Abstract
A secure media distribution scheme is proposed in this paper, which distributes different media copy to different customer in a secure and efficient manner and is able to trace illegal redistribution. At the sender side, media data are scrambled with a random sequence under the control of a secret key. At the receiver side, the scrambled media data are descrambled with a new random sequence under the control of a unique customer code besides the secret key. The scrambling and descrambling strength can be adjusted by the parameter named quantization factor. Generally, the bigger factor is used in scrambling and the smaller one is used in descrambling. After descrambling, the recovered media copy that contains a unique customer sequence, named fingerprint, is slightly different from the original one. This difference is imperceptible to human eyes, while can be detected by computers and used to trace the redistribution of the media copy. Additionally, the unique customer sequence is produced by the collusion-resistant code, which can survive the attacks that combine several copies by averaging. The scheme’s performances, including security, imperceptibility, robustness and efficiency, are analyzed and tested in detail. Its good performances make it a suitable choice for lightweight secure multimedia distribution, such as music download, image sharing, live TV or video-on-demand, etc., especially over Mobile terminals.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Anderson, R., & Manifavas, C. (1997). Chamleon—a new kind of stream cipher. In Fast software encryption. Lecture notes in computer science (pp. 107–113). Berlin: Springer.
AACS. Advanced access content system (AACS) technical overview. http://www.aacsla.com. Accessed by October 2009.
Bloom, J. (2003). Security and rights management in digital cinema. In Proceedings of IEEE international conference acoustic, speech and signal processing (Vol. 4, pp. 712–715).
Boneh, D., & Shaw, J. (1998). Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44, 1897–1905.
Brown, I., Perkins, C., & Crowcroft, J. (1999). Watercasting: distributed watermarking of multicast media. In Lecture notes in computer science : Vol. 2052. Proceedings of international workshop on networked group communication (p. 1735). Berlin: Springer.
Celik, M. U., Sharma, G., & Tekalp, A. M. (2004). Collusion-resilient fingerprinting by random pre-warping. IEEE Signal Processing Letters, 11, 831–835.
Cox, I. J., Miller, M. L., & Bloom, J. A. (2002). Digital watermarking. San Francisco: Morgan Kaufmann.
Dinitz, J. H., & Stinson, D. R. (1992). Contemporary design theory: a collection of surveys. New York: Wiley.
Ganz, A., Park, S. H., & Ganz, Z. (1998). Inline network encryption for multimedia wireless LANs. In IEEE military communications conference, October 1998.
Ganz, A., Park, S. H., & Ganz, Z. (1999). Experimental measurements and design guidelines for real-time software encryption in multimedia wireless LANs. Cluster Computing, 2(1), 35–43.
Goodman, J., & Chandrakasan, A. P. (1998). Low power scalable encryption for wireless systems. Wireless networks, 4, 55–70.
Herrigel, A., Oruanaidh, J., Petersen, H., Pereira, S., & Pun, T. (1998). Secure copyright protection techniques for digital images. In Lecture notes in computer science : Vol. 1525. Second information hiding workshop, IHW. Berlin: Springer.
ISMA. Internet streaming media alliance implementation specification 2.0. http://www.isma.tv. Accessed by October 2009.
Kundur, D., & Karthik, K. (2004). Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE, 92(6), 918–932.
Lemma, A. N., Katzenbeisser, S., & Celik, M. U. (2006). Veen, M.V.. Secure Watermark Embedding Through Partial Encryption. In Lecture notes in computer science : Vol. 4283. Proceedings of international workshop on digital watermarking, IWDW 2006 (pp. 433–445). Berlin: Springer.
Lian, S. (2008). Multimedia content encryption: techniques and applications. London: Auerbach Publication/Taylor & Francis.
Lian, S. (2008). Image authentication based on fractal features. Fractals, 16(4), 287–297.
Lian, S., & Wang, Z. (2008). Collusion-traceable secure multimedia distribution based on controllable modulation. IEEE Transactions on Circuits and Systems for Video Technology, 18(10), 1462–1467.
Lian, S., & Zhang, Y. (2009). Protecting mobile TV multimedia content in DVB/GPRS heterogeneous wireless networks. Journal of Universal Computer Science, 15(5), 1023–1041.
Lian, S., Liu, Z., Ren, Z., & Wang, H. (2006). Secure distribution scheme for compressed data streams. In 2006 IEEE conference on image processing, ICIP 2006, October 2006.
Lian, S., Liu, Z., Ren, Z., & Wang, H. (2006). Secure advanced video coding based on selective encryption algorithms. IEEE Transactions on Consumer Electronics, 52(2), 621–629.
Lian, S., Kanellopoulos, D., & Ruffo, G. (2009). Recent advances in multimedia information system security. Informatica, 33(1), 3–24.
Mao, Y., & Mihcak, M. K. (2005). Collusion-resistant international de-synchronization for digital video fingerprinting. IEEE Conference on Image Processing, 1, 237–240.
Mollin, R. A. (2006). An introduction to cryptography. Boca Raton: CRC Press.
OMA. Open mobile alliance specification version 2.0. http://www.openmobilealliance.org. Accessed by October 2009.
Parnes, R., & Parviainen, R. (2001). Large scale distributed watermarking of multicast media through encryption. In Proc. IFIP int. conf. communications and multimedia security issues of the new century (p. 17).
Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G. (1998). Attacks on copyright marking systems. In D. Aucsmith (Ed.), Lecture notes in computer science : Vol. 1525. Information hiding, second international workshop, IH’98 (pp. 219–239), Portland, USA, April 1998. Berlin: Springer.
Shih, F. Y., & Wu, Y. T. (2005). Robust watermarking and compression for medical images based on genetic algorithms. Information Sciences, 175(3), 200–216.
Tikkanen, K., Hannikainen, M., Hamalainen, T., & Saarinen, J. (2000). Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals. In Proceedings of European signal processing conference (pp. 2289–2292).
Trappe, W., Wu, M., Wang, Z. J., & Liu, K. J. R. (2003). Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing, 51, 1069–1087.
Tsai, H. H., & Sun, D. W. (2007). Color image watermark extraction based on support vector machines. Information Sciences, 177(2), 550–569.
Wang, Z. J., Wu, M., Trappe, W., & Liu, K. J. R. (2004). Group-oriented fingerprinting for multimedia forensics. EURASIP Journal on Applied Signal Processing, 14, 2142–2162.
Wu, Y. (2005). Linear combination collusion attack and its application on an anti-collusion fingerprinting. In IEEE international conference on acoustics, speech, and signal processing, 2005, Proceedings of ICASSP ’05 (Vol. 2, pp. 13–16), March 18–23.
Wu, M., Trappe, W., Wang, Z., & Liu, K. J. R. (2004). Collusion resistant fingerprinting for multimedia. IEEE Signal Processing Magazine, Special Issue on Digital Rights Management, 21(2), 15–27.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lian, S., Chen, X. Lightweight secure multimedia distribution based on homomorphic operations. Telecommun Syst 49, 187–197 (2012). https://doi.org/10.1007/s11235-010-9367-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-010-9367-2