Advances in Digital Video Content Protection

The use of digital video offers immense opportunities for creators; however, the ability for anyone to make perfect copies and the ease by which those copies can be distributed also facilitate misuse, illegal copying and distribution ("piracy"), plagiarism, and misappropriation. Popular Internet software based on a peer-to-peer architecture has been used to share copyrighted movies, music, software, and other materials. Concerned about the consequences of illegal copying and distribution on a massive scale, content owners are interested in digital rights management (DRM) systems which can protect their rights and preserve the economic value of digital video. A DRM system protects and enforces the rights associated with the use of digital content. Unfortunately, the technical challenges for securing digital content are formidable and previous approaches have not succeeded. We overview the concepts and approaches for video DRM and describe methods for providing security, including the roles of encryption and video watermarking. Current efforts and issues are described in encryption, watermarking, and key management. Lastly, we identify challenges and directions for further investigation in video DRM.

[1]  Germano Caronni,et al.  Enabling hierarchical and bulk-distribution for watermarked content , 2001, Seventeenth Annual Computer Security Applications Conference.

[2]  Marta Karczewicz,et al.  The SP- and SI-frames design for H.264/AVC , 2003, IEEE Trans. Circuits Syst. Video Technol..

[3]  Nasir D. Memon,et al.  Preventing Piracy, Reverse Engineering, and Tampering , 2003, Computer.

[4]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..

[5]  Reginald L. Lagendijk,et al.  Real-Time Labeling of MPEG-2 Compressed Video , 1998, J. Vis. Commun. Image Represent..

[6]  Ahmed H. Tewfik,et al.  Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..

[7]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[8]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[9]  Iwan Setyawan,et al.  Synchronization-insensitive video watermarking using structured noise pattern , 2002, IS&T/SPIE Electronic Imaging.

[10]  C.-C. Jay Kuo,et al.  Efficient multimedia encryption via entropy codec design , 2001, IS&T/SPIE Electronic Imaging.

[11]  M. Tomlinson,et al.  DWT-based high-capacity blind video watermarking, invariant to geometrical attacks , 2003 .

[12]  J. William Atwood,et al.  Proxy encryptions for secure multicast key management , 2003, 28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings..

[13]  Edward J. Delp,et al.  Security of digital entertainment content from creation to consumption , 2003, Signal Process. Image Commun..

[14]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[15]  Gwenaël J Doërr,et al.  Switching between orthogonal watermarks for enhanced security against collusion in video , 2003 .

[16]  Mostafa H. Ammar,et al.  WHIM: watermarking multicast video with a hierarchy of intermediaries , 2002, Comput. Networks.

[17]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[18]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..

[19]  W. Richard Stevens,et al.  TCP/IP Illustrated, Volume 1: The Protocols , 1994 .

[20]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[21]  K. J. Ray Liu,et al.  Key management and distribution for secure multimedia multicast , 2003, IEEE Trans. Multim..

[22]  Stefan Katzenbeisser,et al.  Watermarking schemes provably secure against copy and ambiguity attacks , 2003, DRM '03.

[23]  Matthew J. Moyer,et al.  A survey of security issues in multicast communications , 1999, IEEE Network.

[24]  Walter Fumy,et al.  Principles of Key Management , 1993, IEEE J. Sel. Areas Commun..

[25]  Hua Wang,et al.  A secure multicast protocol with copyright protection , 2002, CCRV.

[26]  Edward J. Delp,et al.  Benchmarking of image watermarking algorithms for digital rights management , 2004, Proceedings of the IEEE.

[27]  Iskender Agi,et al.  An empirical study of secure MPEG video transmissions , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[28]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[29]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[30]  Mihaela van der Schaar,et al.  Adaptive motion-compensation fine-granular-scalability (AMC-FGS) for wireless video , 2002, IEEE Trans. Circuits Syst. Video Technol..

[31]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[32]  Paul England,et al.  The Darknet and the Future of Content Distribution , 2003 .

[33]  Bernd Girod,et al.  Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[34]  Reginald L. Lagendijk,et al.  Optimal differential energy watermarking of DCT encoded images and video , 2001, IEEE Trans. Image Process..

[35]  Edward J. Delp,et al.  Wavelet based rate scalable video compression , 1999, IEEE Trans. Circuits Syst. Video Technol..

[36]  Ton Kalker,et al.  Streaming video and rate-scalable compression: What are the challenges for watermarking? , 2001, IS&T/SPIE Electronic Imaging.

[37]  Ralf Steinmetz,et al.  Combined video and audio watermarking: embedding content information in multimedia data , 2000, Electronic Imaging.

[38]  Adnan M. Alattar,et al.  Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video , 2003, IEEE Trans. Circuits Syst. Video Technol..

[39]  Jean-Luc Dugelay,et al.  A guide tour of video watermarking , 2003, Signal Process. Image Commun..

[40]  Edward J. Delp,et al.  Temporal synchronization in video watermarking , 2004, IEEE Transactions on Signal Processing.

[41]  Tihao Chiang,et al.  A robust fine granularity scalability using trellis-based predictive leak , 2002, IEEE Trans. Circuits Syst. Video Technol..

[42]  R. Parloff Morpheus Falling? , 2003, IEEE Spectrum.

[43]  Stephan Wenger,et al.  H.264/AVC over IP , 2003, IEEE Trans. Circuits Syst. Video Technol..

[44]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[45]  John G. Apostolopoulos,et al.  Secure scalable streaming enabling transcoding without decryption , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[46]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[47]  Klara Nahrstedt,et al.  Secure multicast protocol with copyright protection , 1999, Electronic Imaging.

[48]  Colin Perkins,et al.  Watercasting: Distributed Watermarking of Multicast Media , 1999, Networked Group Communication.

[49]  N. Bourbakis,et al.  SCAN-Based Compression-Encryption-Hiding for Video on Demand , 2003, IEEE Multim..

[50]  Ross J. Anderson Cryptography and competition policy: issues with 'trusted computing' , 2003, PODC '03.

[51]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[52]  Chun-Shien Lu,et al.  Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector , 2002, IEEE Trans. Image Process..

[53]  Jean-Luc Dugelay,et al.  Watermarking video, hierarchical embedding in motion vectors , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[54]  Ralf Steinmetz,et al.  New approach for transformation-invariant image and video watermarking in the spatial domain: self-spanning patterns (SSP) , 2000, Electronic Imaging.

[55]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[56]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[57]  Ahmet M. Eskicioglu,et al.  Multimedia security in group communications: recent progress in key management, authentication, and watermarking , 2003, Multimedia Systems.

[58]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[59]  D. Touretzky Gallery of CSS Descramblers , 2002 .

[60]  Darko Kirovski,et al.  Blind pattern matching attack on watermarking systems , 2003, IEEE Trans. Signal Process..

[61]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[62]  Ya-Qin Zhang,et al.  Transporting real-time video over the Internet: challenges and approaches , 2000, Proceedings of the IEEE.

[63]  Ton Kalker,et al.  Digital watermarking for DVD video copy protection , 2000 .

[64]  A. M. Eskicloglu Protecting intellectual property in digital multimedia networks , 2003 .

[65]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[66]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[67]  Yuzhuo Zhong,et al.  Efficient and fully scalable encryption for MPEG-4 FGS , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[68]  Faouzi Kossentini,et al.  H.263+: video coding at low bit rates , 1998, IEEE Trans. Circuits Syst. Video Technol..

[69]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[70]  Shueng-Han Gary Chan,et al.  Key management approaches to offer data confidentiality for secure multicast , 2003 .

[71]  Ghassan Al-Regib,et al.  Evaluation of selective encryption techniques for secure transmission of MPEG-compressed bit-streams , 1999, ISCAS'99. Proceedings of the 1999 IEEE International Symposium on Circuits and Systems VLSI (Cat. No.99CH36349).

[72]  Weiping Li,et al.  Overview of fine granularity scalability in MPEG-4 video standard , 2001, IEEE Trans. Circuits Syst. Video Technol..

[73]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[74]  Mauro Barni,et al.  A general framework for robust watermarking security , 2003, Signal Process..

[75]  Pamela Samuelson,et al.  DRM {and, or, vs.} the law , 2003, CACM.

[76]  Eric DIEHL,et al.  /spl copy/ watermark: closing the analog hole , 2003, 2003 IEEE International Conference on Consumer Electronics, 2003. ICCE..

[77]  Min Wu,et al.  Reading Between the Lines: Lessons from the SDMI Challenge , 2001, USENIX Security Symposium.

[78]  M. G. Strintzis,et al.  Self-synchronizing watermark detection for MPEG-4 objects , 2001, ICECS 2001. 8th IEEE International Conference on Electronics, Circuits and Systems (Cat. No.01EX483).

[79]  A. Murat Tekalp,et al.  Collusion-resilient fingerprinting using random prewarping , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[80]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[81]  Bernd Girod,et al.  Informed Watermarking , 2002 .

[82]  Jessica Litman Digital Copyright , 2017 .

[83]  Edward W. Felten,et al.  A skeptical view of DRM and fair use , 2003, CACM.

[84]  Yan Lin,et al.  A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression , 2003, IEEE Trans. Circuits Syst. Video Technol..

[85]  Ton Kalker,et al.  Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.

[86]  Touradj Ebrahimi,et al.  MPEG-4 natural video coding - An overview , 2000, Signal Process. Image Commun..

[87]  Benoit M. Macq,et al.  Geometrically invariant watermarking using feature points , 2002, IEEE Trans. Image Process..

[88]  Ahmet M. Eskicioglu,et al.  Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions , 2003 .

[89]  Christoph Busch,et al.  Video watermarking resistance to rotation, scaling, and translation , 2002, IS&T/SPIE Electronic Imaging.

[90]  Jon M. Peha,et al.  Streaming video over the Internet: approaches and directions , 2001, IEEE Trans. Circuits Syst. Video Technol..

[91]  Deirdre K. Mulligan,et al.  How DRM-based content delivery systems disrupt expectations of "personal use" , 2003, DRM '03.

[92]  Frank Hartung,et al.  Watermarking of multimedia content for m-commerce applications , 2000 .

[93]  D. Clark How copyright became controversial , 2002, CFP '02.

[94]  Avishai Wool Key management for encrypted broadcast , 1998, CCS '98.

[95]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[96]  Edward J. Delp,et al.  An integrated approach to encrypting scalable video , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[97]  Jun Zhang,et al.  Video watermark technique in motion vector , 2001, Proceedings XIV Brazilian Symposium on Computer Graphics and Image Processing.

[98]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[99]  Mostafa Ammar,et al.  Security issues and solutions in multicast content distribution: a survey , 2003 .

[100]  Mauro Barni,et al.  Advantages and drawbacks of multiplicative spread spectrum watermarking , 2003, IS&T/SPIE Electronic Imaging.

[101]  Thierry Pun,et al.  Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.

[102]  Gabriela Csurka,et al.  Robust 3D DFT video watermarking , 1999, Electronic Imaging.

[103]  Avideh Zakhor,et al.  Video multicast using layered FEC and scalable compression , 2001, IEEE Trans. Circuits Syst. Video Technol..

[104]  Christophe De Vleeschouwer,et al.  Human visual system features enabling watermarking , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[105]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[106]  Edward J. Delp,et al.  Watermark evaluation testbed , 2006, J. Electronic Imaging.

[107]  Benoit M. Macq,et al.  Generalized 2-D cyclic patterns for secret watermark generation , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[108]  Edward J. Delp,et al.  Watermark embedding: hiding a signal within a cover image , 2001, IEEE Commun. Mag..

[109]  Thierry Pun,et al.  Secure hybrid robust watermarking resistant against tampering and copy attack , 2003, Signal Process..

[110]  Jiwu Huang,et al.  A robust DWT-based video watermarking algorithm , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[111]  Min Wu,et al.  Anti-collusion codes: multi-user and multimedia perspectives , 2002, Proceedings. International Conference on Image Processing.

[112]  Thierry Pun,et al.  Optimal adaptive diversity watermarking with channel state estimation , 2001, IS&T/SPIE Electronic Imaging.

[113]  Michael White,et al.  World Intellectual Property Organization , 2000, Permanent Missions to the United Nations, No. 309.

[114]  Chen-Hsiu Huang Video Transcoding Architectures and Techniques : An Overview , 2003 .

[115]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[116]  Nasir D. Memon,et al.  On sequential watermark detection , 2003, IEEE Trans. Signal Process..

[117]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..