Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang

Multimedia Security

Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_284-1



Multimedia is content composed of different types of digital objects such as text, audio, image, and video. Multimedia security addresses the protection of the intellectual property and the privacy of multimedia during acquisition, storage, processing, transmission, consumption, and disposal.

Historical Background

Advances in digital technologies have created significant changes in the way how multimedia is produced, distributed, marketed, and consumed. Typically, parties involved in multimedia business are creator/owner, distributor, and consumer/user. By preserving the security of multimedia, it is essentially protecting rights of all these parties. One notable milestone is the usage of Content Scramble System in the late 1990s, which is built on a stream cipher with 40-bit key, to protect commercially produced DVD discs by binding the content to a particular playback device (CSS, 1996). It is later superseded by newer schemes such as...

This is a preview of subscription content, log in to check access.


  1. (1996) Content Scramble System. http://www.dvdcca.org/css.aspx. Accessed 02 Aug 2018
  2. (1996) Summary of the HIPAA Security Rule. https:// www.hhs.gov/hipaa/for-professionals/security/laws- regulations/index.html. Accessed 02 Aug 2018
  3. (2001) 4C Entity CPRM Specification. http://www.4centity.com/specification.aspx. Accessed 02 Aug 2018
  4. (2005) Advanced Access Content System Specification. https://www.aacsla.com/specifications/. Accessed 02 Aug 2018
  5. (2015) Encrypted BigQuery Client. https://open source.google.com/projects/encrypted-bigquery-client. Accessed 02 Aug 2018
  6. (2015) Intel Software Guard Extensions. https://software.intel.com/en-us/sgx. Accessed 02 Aug 2018
  7. (2016) ISO Common Encryption Protection Scheme. https://www.w3.org/TR/eme-stream-mp4/. Accessed 02 Aug 2018
  8. (2017) W3C Recommendation Encrypted Media Extensions. https://www.w3.org/TR/encrypted-media/. Accessed 02 Aug 2018
  9. (2018) Pixek. https://pixek.io/. Accessed 02 Aug 2018
  10. (2018) Response of the Motion Picture Association of America to National Telecommunications and Information Administration Internet Priorities Inquiry. https://www.mpaa.org/wp-content/uploads /2018 /07 /180717-MPAA-response-to-NTIA-internet-priorities- inquiry.pdf. Accessed 02 Aug 2018
  11. Barni M, Bartolini F (2004) Watermarking systems engineering: enabling digital assets security and other applications. CRC Press, Boca Raton, FLGoogle Scholar
  12. Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423–1443MathSciNetCrossRefGoogle Scholar
  13. Chen S, Pande A, Zeng K, Mohapatra P (2015) Live video forensics: source identification in lossy wireless networks. IEEE Trans Inf Forensics Secur 10(1):28–39CrossRefGoogle Scholar
  14. Cox I, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRefGoogle Scholar
  15. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, San Francisco, CAGoogle Scholar
  16. Lindell Y (2003) Composition of secure multi-party protocols: a comprehensive study. Springer Berlin Heidelberg, New YorkCrossRefGoogle Scholar
  17. Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205–214.  https://doi.org/10.1109/TIFS.2006.873602CrossRefGoogle Scholar
  18. Massoudi A, Lefebvre F, De Vleeschouwer C, Macq B, Quisquater J (2008) Overview on selective encryption of image and video: challenges and perspectives. Eurasip J Inf Secur 5:1–18Google Scholar
  19. Milani S, Fontani M, Bestagini P, Barni M, Piva A, Tagliasacchi M, Tubaro S (2012) An overview on video forensics. APSIPA Trans Signal Inf Process 1: 1–18CrossRefGoogle Scholar
  20. Ohrimenko O, Schuster F, Fournet C, Mehta A, Nowozin S, Vaswani K, Costa M (2016) Oblivious multi-party machine learning on trusted processors. In: USENIX security symposium, pp 619–636Google Scholar
  21. Stutz T, Uhl A (2012) A survey of H.264 AVC/SVC encryption. IEEE Trans Circuits Syst Video Technol 22(3):325–339CrossRefGoogle Scholar
  22. Yao ACC (1986) How to generate and exchange secrets. In: 27th annual symposium on foundations of computer science (FOCS), pp 162–167Google Scholar
  23. Zheng Y, Cui H, Wang C, Zhou J (2017) Privacy-preserving image denoising from external cloud databases. IEEE Trans Inf Forensics Secur 12(6):1285–1298CrossRefGoogle Scholar

Authors and Affiliations

  1. 1.School of Information TechnologyDeakin UniversityGeelongAustralia
  2. 2.George Mason UniversityFairfaxUSA

Section editors and affiliations

  • Kui Ren

There are no affiliations available