New paradigms for effective multicasting and fingerprinting of entertainment media

The large-scale adoption of network-centric entertainment systems rests on the ability to provide reliable, low-cost, and secure services for all parties in the entertainment distribution system. The use of modern data networks such as the Internet to communicate digital entertainment media is motivated, in part, by advancements in communication networking, signal processing, and storage technologies that facilitate more flexible and granular business models. This same technological progress can also be shown to equip potential "attackers" with the means to more easily violate system security. A broad class of system security issues for entertainment applications is addressed by the growing field of digital rights management. This article focuses on an aspect of DRM that involves multicast entertainment media distribution using digital encryption and digital fingerprinting technologies to prevent widespread piracy. The goal of DRM is to provide protection and facilitate equitable compensation for all parties in the entertainment distribution chain including content creators, aggregators, distributors, and consumers. Previous security proposals to protect entertainment media have sacrificed broadcast efficiency for security. This article collectively addresses security and broadcast efficiency for network-centric entertainment systems, an area of research seldom explored. We present the challenges, technological solutions, and future trends of this emerging field.

[1]  Roland Parviainen,et al.  Large Scale distributed watermarking of multicast media through encryption , 2001, Communications and Multimedia Security.

[2]  K. J. Ray Liu,et al.  Bandwidth efficient fingerprint multicast for video streaming , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[3]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[4]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[5]  Colin Perkins,et al.  Watercasting: Distributed Watermarking of Multicast Media , 1999, Networked Group Communication.

[6]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[7]  Marvin A. Sirbu,et al.  Pricing Multicast Communication: A Cost-Based Approach , 2001, Telecommun. Syst..

[8]  R. Akalu,et al.  Technological protection measures in the courts , 2004, IEEE Signal Processing Magazine.

[9]  A. Murat Tekalp,et al.  Collusion-resilient fingerprinting using random prewarping , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[10]  A. Murat Tekalp,et al.  Collusion-resilient fingerprinting by random pre-warping , 2004, IEEE Signal Processing Letters.

[11]  Huifang Sun,et al.  Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards , 1999 .

[12]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[13]  Deepa Kundur,et al.  Digital Media Fingerprinting : Techniques and Trends , 2004 .