Skip to main content
Log in

Multimedia digital rights management based on selective encryption for flexible business model

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes an advanced encryption of MP3 and MPEG-4 coder with a quality degradation-based security model. For the MP3 audio, the magnitude and phase information of modified discrete cosine transform (MDCT) coefficients is encrypted. DCT coefficients and motion vectors (MVs) are used for the scrambling of the MPEG-4 video. This encryption scheme has a level of security, secures in perception, keeps format compliance, and obtains better time efficiency by reducing the encrypted volumes of multimedia contents. These properties make it practical to incorporate encryption and decryption process into compression and decompression process, and thus suitable for secure A/V transmission or sharing. Experimental results indicate that the proposed technique provides levels of security for a flexible business model and achieves a simple and coding-efficient architecture with no adverse impact on error resilience.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Agi I, Gong L (1996) An empirical study of mpeg video transmissions. Proceedings of the Internet Society Symposium on Network and Distributed System Security, San Diego, pp 137–144

    Google Scholar 

  2. Bassia P, Pitas I, Nikolaidis N (2001) Robust audio watermarking in the time domain. IEEE Trans Multimed 3(2):232–241

    Article  Google Scholar 

  3. Borujeni SE (2000) Speech encryption based on fast Fourier transform permutation. IEEE Int Conf Electron Circ Syst 1:290–293

    Google Scholar 

  4. Cox I, Kilian J, Leighton F, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  5. Cox IJ, Miller ML, Bloom JA (2000) Watermarking applications and their properties. Proc. IEEE International Conference on Information Technology, Coding and Computing, Las Vegas, pp 6–10

    Google Scholar 

  6. Farkash S, Raz S, Malah D (1991) “Analog speech scrambling via the Gabor representation,” Proc. of the 17th Convention of Electrical and Electronics Engineers in Israel, pp. 365–368

  7. Gall DL (1991) MPEG: a video compression standard for multimedia applications. Commun ACM 34(4):46–58

    Article  Google Scholar 

  8. Khan JY, Das P (2002) MPEG-4 video over packet switched connection of the WCDMA air interface. Int Symp Pers Indoor Mob Radio Commun 5:2189–2193

    Article  Google Scholar 

  9. Kwon GR, Lee TY, Kim KH, Jin JD, Ko SJ (2005) Multimedia digital right management using selective scrambling for mobile handset. CIS2005 LNAI 3802:1098–1103

    Google Scholar 

  10. Li W, Xinping H, Leung H (2004) Performance evaluation of digital audio watermarking algorithms. IEEE Trans Aerosp Electron Syst 40:12–26

    Article  Google Scholar 

  11. A. Matsunaga, K. Koga, and M. Ohkawa, “An analog speech scrambling system using the FFT technique with high level security,” IEEE Trans. on Selected Areas in Communications, Vol. 7, No. 4, pp. 540–547, May. 1989.

  12. Neubauer C, Herre J, Brandenburg K (1998) Continuous steganographic data transmission using uncompressed audio. Proc. Information HidingWorkshop, Portland, pp 208–217

    Google Scholar 

  13. Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding: a survey. Proc IEEE 87(7):1062–1078

    Article  Google Scholar 

  14. Piva A, Bartolini F, Barni M (2002) Managing copyright in open networks. IEEE Internet Comput 6(3):18–26

    Article  Google Scholar 

  15. Qiao L, Nahrstedt K (1997) A new algorithm for MPEG video encryption. Proceedings of The First International Conference on Imaging Science, Systems, and Technology (CISST97), Las Vegas, pp 21–29

    Google Scholar 

  16. Qiao L, Nahrstedt K (1998) Comparison of MPEG encryption algorithms. Comput Graph 22(4):437–448

    Article  Google Scholar 

  17. Schneier B (1996) Applied cryptography, 2nd edn. Wiley and Sons, New York

    MATH  Google Scholar 

  18. Spanos G, Maples T (1995) Performance study of a selective encryption scheme for the security of networked, real-time video. Proc. of 4th International Conference on Computer Communications and Networks, Las Vegas

    Book  Google Scholar 

  19. Tang L (1996) Methods for encrypting and decrypting MPEG video data efficiently. Proc. ACM Multimedia 96, Boston, pp 219–230

    Google Scholar 

  20. Wang J, Healy R, Timoney J (2011) A robust audio watermarking scheme based on reduced singular value decomposition and distortion removal. Signal Process 91:1693–1708

    Article  MATH  Google Scholar 

  21. Xiang S, Joong Kim H, Huang J (2008) Audio watermarking robust against time-scale modification and MP3 compression. Signal Process 88:2372–2387

    Article  MATH  Google Scholar 

  22. Yeh C, Kuo C (1999) Digital watermarking through quasi m-arrays. Proc. IEEE Workshop on Signal Processing Systems, Taipei, pp 456–461

    Google Scholar 

  23. Zeng W, Lei S (2003) Efficient frequency domain selective scrambling of digital video. IEEE Trans Multimed 5:118–129

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No.2010-0008974). Correspondence should be addressed to Dr. Chun-Su Park (cspark@sejong.ac.kr)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chun-Su Park.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kwon, GR., Lama, R.K., Pyun, JY. et al. Multimedia digital rights management based on selective encryption for flexible business model. Multimed Tools Appl 75, 6697–6715 (2016). https://doi.org/10.1007/s11042-015-2563-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2563-z

Keywords

Navigation