AACS-compatible multimedia joint encryption and fingerprinting: Security issues and some solutions

In this paper, a new multimedia joint encryption and fingerprinting (JEF) scheme embedded into the advanced access content system (AACS) is proposed for multimedia transmission over networks. AACS is selected because it has been jointly developed by many famous companies and has been considered as the leading technology in content access control and multimedia distribution. In this framework, many attack points exist and can be exploited to defeat it. Furthermore, multiple attack points can be combined to form multi-point collusion attacks, which also endanger the proposed system. In this paper, we address the security concerns toward AACS-compatible JEF system in its entirety and propose solutions to cope with some security threats. The contributions of this paper include: (i) applying multimedia encryption at different points to resist some attacks points; (ii) proposing rewritable fingerprint embedding (RFE) to deal with some multi-point collusion attacks; (iii) designing a perceptual security spectrum metric (PSSM) to evaluate the degree of security when multiple encryptions are applied. The feasibility of the proposed AACS-compatible JEF method is further demonstrated through simulation results.

[1]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[2]  K. J. Ray Liu,et al.  Fingerprint multicast in secure video streaming , 2006, IEEE Transactions on Image Processing.

[3]  Steve McLaughlin,et al.  Comparative study of textural analysis techniques to characterise tissue from intravascular ultrasound , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[4]  Bernd Girod,et al.  Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[5]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[6]  Min Wu,et al.  Collusion-resistant fingerprinting for multimedia , 2004 .

[7]  Chun-Shien Lu,et al.  Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection , 2006, IEEE Transactions on Multimedia.

[8]  Bharat K. Bhargava,et al.  A fast MPEG video encryption algorithm , 1998, MULTIMEDIA '98.

[9]  Heidi A. Peterson,et al.  Luminance-model-based DCT quantization for color image compression , 1992, Electronic Imaging.

[10]  Deepa Kundur,et al.  Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.

[11]  James R. Hopgood,et al.  Nonconcurrent multiple speakers tracking based on extended Kalman particle filter , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[12]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[13]  Xiaowei Xu,et al.  A hybrid scheme for encryption and watermarking , 2004, IS&T/SPIE Electronic Imaging.

[14]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[15]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[16]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[17]  Kuo-Chin Fan,et al.  Motion-embedded residual error for packet loss recovery of video transmission and encryption , 2006, Electronic Imaging.

[18]  Darko Kirovski,et al.  Blind pattern matching attack on watermarking systems , 2003, IEEE Trans. Signal Process..

[19]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..

[20]  Ahmed H. Tewfik,et al.  Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..

[21]  Shipeng Li,et al.  Scalable protection for MPEG-4 fine granularity scalability , 2005, IEEE Transactions on Multimedia.

[22]  Deepa Kundur,et al.  Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance , 2005, IEEE Transactions on Multimedia.

[23]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[24]  Vincent Leith,et al.  The Rijndael Block Cipher , 2010 .

[25]  Lei Tang,et al.  Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.

[26]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[27]  Jeffrey A. Bloom Security and rights management in digital cinema , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..