Quasi-commutative watermarking and encryption for secure media content distribution

Commutative Watermarking and Encryption (CWE) provides a solution for interoperation between watermarking and encryption. It realizes the challenging operation that embeds a watermark into the encrypted multimedia data directly, which avoids the decryption–watermarking–encryption triples. Till now, few CWE schemes have been reported. They often obtain the commutative property by partitioning multimedia data into independent parts (i.e., the encryption part and the watermarking part). Since the two parts are isolated, it can not keep secure enough against replacement attacks. To avoid the disadvantage, a novel quasi-commutative watermarking and encryption (QCWE) scheme based on quasi-commutative operations is proposed in this paper. In the proposed scheme, the encryption operation and watermarking operation are applied to the same data part. Since the two operations are homogenous with commutative properties, their orders can be commutated. As an example, the scheme for MPEG2 video encryption and watermarking is presented. In this example, the DCs in intra macroblocks are encrypted or watermarked based on random module addition, while the DCs in other macroblocks and all the ACs’ signs are encrypted with a stream cipher or block cipher. Analysis and experiments show that the scheme obtains high perceptual security and time efficiency, and the watermarking and encryption operations can be commutated. These properties make the scheme a suitable choice for efficient media content distribution. Additionally, the paper shows the availability of constructing the commutative watermarking and encryption scheme with homogenous operations, which is expected to activate the new research topic.

[1]  Wenjun Zeng,et al.  A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..

[2]  David K. Y. Yau,et al.  A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation , 2005, IEEE Transactions on Multimedia.

[3]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[4]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[5]  David K. Y. Yau,et al.  A Multi-key Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences : Theory , Design , and Implementation , 2005 .

[6]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[7]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[8]  Edward J. Delp,et al.  Advances in Digital Video Content Protection , 2005, Proceedings of the IEEE.

[9]  Jun Wang,et al.  Intermediate spin state stabilized by the Jahn-Teller distortion in La1/2Ba1/2CoO3 , 2002 .

[10]  Philip Ogunbona,et al.  Recovering DC Coefficients in Block-Based DCT , 2006, IEEE Transactions on Image Processing.

[11]  Richard A. Mollin,et al.  An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications) , 2006 .

[12]  N Haba,et al.  肥満ブレーンシナリオにおける(ス)フェルミオン質量 , 2002 .

[13]  Solomon W. Golomb,et al.  Shift Register Sequences , 1981 .

[14]  David K. Y. Yau,et al.  A case for a multi-key secure video proxy: theory, design, and implementation , 2002, MULTIMEDIA '02.

[15]  Lintian Qiao,et al.  A New Algorithm for MPEG Video Encryption , 2007 .

[16]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[17]  Shiguo Lian,et al.  Secure advanced video coding based on selective encryption algorithms , 2006, IEEE Trans. Consumer Electron..

[18]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[19]  Yi Shi,et al.  Embedding image watermarks in dc components , 2000, IEEE Trans. Circuits Syst. Video Technol..

[20]  Bharat K. Bhargava,et al.  A fast MPEG video encryption algorithm , 1998, MULTIMEDIA '98.

[21]  Shiguo Lian,et al.  Secure Distribution Scheme for Compressed Data Streams , 2006, 2006 International Conference on Image Processing.

[22]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[23]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[24]  Yulin Wang,et al.  Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain , 2006, IEEE Transactions on Image Processing.

[25]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[26]  Enrico Hauer,et al.  Synchronization technique to detect MPEG video frames for watermark retrieval , 2004, IS&T/SPIE Electronic Imaging.

[27]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[28]  Shiguo Lian,et al.  Commutative watermarking and encryption for media data , 2006 .

[29]  Min Wu,et al.  A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.

[30]  Stefan Katzenbeisser,et al.  Secure Watermark Embedding Through Partial Encryption , 2006, IWDW.

[31]  Shiguo Lian,et al.  Joint Fingerprint Embedding and Decryption for Video Distribution , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[32]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[33]  Michael G. Strintzis,et al.  Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD , 2003, Multimedia Systems.

[34]  Shyhtsun Felix Wu,et al.  Selective Encryption and Watermarking of MPEG Video (Extended Abstract) , 1997 .

[35]  Richard Mollin An introduction to cryptography , 2001, CRC Press series on discrete mathematics and its applications.

[36]  Charalampos Manifavas,et al.  Chameleon - A New Kind of Stream Cipher , 1997, FSE.