Abstract
In this paper, we propose a new encryption method for intellectual property rights management of MPEG-4 coder. DCT coefficients and motion vectors (MVs) are used for the combination encryption of the MPEG-4 video. Experimental results indicate that the proposed joint and partial encryption technique provides levels of security and achieves a simple and coding-efficient architecture with no adverse impact on error resilience.
This research was supported by Seoul Future Contents Convergence (SFCC) Cluster established by Seoul Industry-Academy-Research Cooperation Project.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Schneier, B.: Applied cryptography. Wiley and Sons, Chichester (1996)
Piva, A., Bartolini, F., Barni, M.: Managing copyright in open networks. IEEE Internet Computing 6, 18–26 (2002)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding: a survey. Proceedings of the IEEE 87, 1062–1078 (1999)
Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proc. ACM Multimedia, vol. 96, pp. 219–230 (1996)
Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. on Multimedia 5, 118–129 (2003)
Cox, I.J., Miller, M.L., Bloom, J.A.: Watermarking applications and their properties. In: Proc. IEEE International Conference on Information Technology. Coding and Computing, pp. 6–10 (2000)
Khan, J.Y., Das, P.: MPEG4 Video over Packet Switched Connection of the WCDMA Air Interface. In: Proc. of the 13th IEEE International Symposium on Personal Indoor and Mobile Radio Communications, vol. 5, pp. 2189–2193 (2002)
Gall, D.L.: MPEG: a video compression standard for multimedia applications. Communications of the ACM 34, 46–58 (1991)
Spanos, G., Maples, T.: Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-time Video. In: Proceedings of 4th International Conference on Computer Communications and Networks (1995)
Agi, I., Gong, L.: An Empirical Study of Mpeg Video Transmissions. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp. 137–144 (1996)
Qiao, L., Nahrstedt, K.: A New Algorithm for MPEG Video Encryption. In: Proceedings of The First International Conference on Imaging Science, Systems, and Technology (CISST 1997), pp. 21–29 (1997)
Qiao, L., Nahrstedt, K.: Comparison of MPEG encryption algorithms. Computers and Graphics 22, 437–448 (1998)
Kwon, G.-R., Lee, T.-Y., Kim, K.-H., Jin, J.-D., Ko, S.-J.: Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS, vol. 3802, pp. 1098–1103. Springer, Heidelberg (2005)
EPIC(Electronic Privacy Information Center) Digital Right Management and Privacy Page, http://www.epic.org/privacy/drm/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwon, GR., Lee, KH., Nam, SJ., Ko, SJ. (2006). Intellectual Property Rights Management Using Combination Encryption in MPEG-4. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_16
Download citation
DOI: https://doi.org/10.1007/11922841_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48825-5
Online ISBN: 978-3-540-48827-9
eBook Packages: Computer ScienceComputer Science (R0)