Multimedia contents security: watermarking diversity and secure protocols

The objective of this paper is to give an overview of current developments and problems in the field of security in multimedia. The problems and general solution of multimedia security based on digital watermarking and cryptography are introduced. We provide evolution of watermarking, together with its properties and requirements. Digital watermarking and quality parameters are presented, too. Next, we arrive to the problem of security mechanisms and measures. Finally, some secure protocols are analyzed as well as improvements in digital watermarking through diversity.

[1]  Klara Nahrstedt,et al.  Comparison of MPEG encryption algorithms , 1998, Comput. Graph..

[2]  Edward K. Wong,et al.  Marking and detection of text documents using transform-domain techniques , 1999, Electronic Imaging.

[3]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[4]  Minerva M. Yeung,et al.  Fragile imperceptible digital watermark with privacy control , 1999, Electronic Imaging.

[5]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[6]  Klara Nahrstedt,et al.  Watermarking methods for MPEG encoded video: towards resolving rightful ownership , 1998, Proceedings. IEEE International Conference on Multimedia Computing and Systems (Cat. No.98TB100241).

[7]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[8]  Lawrence O'Gorman,et al.  Electronic Marking and Identification Techniques to Discourage Document Copying , 1995, IEEE J. Sel. Areas Commun..

[9]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[10]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[11]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[12]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[13]  Ralf Steinmetz,et al.  Robust MPEG video watermarking technologies , 1998, MULTIMEDIA '98.

[14]  Imants D. Svalbe,et al.  Algebraic construction of a new class of quasi-orthogonal arrays for steganography , 1999, Electronic Imaging.

[15]  Paul G. Flikkema,et al.  Spread-spectrum techniques for wireless communication , 1997, IEEE Signal Process. Mag..

[16]  Kenji Ohue A Generation Method of Periodic Orthogonal Numerical Sequences with Small Maximum Amplitude for any Period , 1997 .

[17]  Shih-Fu Chang,et al.  Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.

[18]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[19]  D. Estrin,et al.  RSVP: a new resource reservation protocol , 2001 .

[20]  Imants D. Svalbe,et al.  Discrete angle watermark encoding and recovery , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[21]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[22]  D. Estrin,et al.  RSVP: a new resource reservation protocol , 1993, IEEE Communications Magazine.

[23]  Jiri Fridrich,et al.  Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[24]  F. MacWilliams,et al.  Pseudo-random sequences and arrays , 1976, Proceedings of the IEEE.