New channels for carrying copyright and usage rights data in digital multimedia distribution

Protection of intellectual property is a critical issue in digital multimedia distribution systems. Cryptographic tools are commonly used for secure delivery of content and access keys to consumers via terrestrial, satellite, cable and Internet transmissions. A third requirement is the distribution of the copyright or usage rights associated with the digital content. The integrity, as opposed to security, of this data is essential to prevent unauthorized modification. Two approaches have been proposed in the open literature: allocating special fields in the transport stream and embedding a watermark into multimedia content. We present two new methods, based on secret sharing, to create channels with guaranteed data integrity.

[1]  Ahmet M. Eskicioglu A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast Networks , 2001 .

[2]  Sandro Rafaeli,et al.  A Decentralised Architecture for Group Key Management , 2000 .

[3]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[4]  Ahmet M. Eskicioglu,et al.  Simulation Results , 2020, Group Selection in Predator-Prey Communities. (MPB-9), Volume 9.

[5]  Ahmet M. Eskicioglu Key transport protocol based on secret sharing: an application to conditional access systems , 2001, IS&T/SPIE Electronic Imaging.

[6]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[7]  Edward J. Delp,et al.  Streaming video and rate scalable compression: what are the challenges for watermarking? , 2004, J. Electronic Imaging.

[8]  Edward J. Delp,et al.  An integrated approach to encrypting scalable video , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[9]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[10]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[11]  Edward J. Delp,et al.  Temporal synchronization in video watermarking , 2004, IEEE Trans. Signal Process..

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[13]  Edward J. Delp,et al.  Security of digital entertainment content from creation to consumption , 2003, Signal Process. Image Commun..

[14]  Gene Tsudik,et al.  IP multicast security: Issues and directions , 2000, Ann. des Télécommunications.

[15]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[16]  Matthew J. Moyer,et al.  A survey of security issues in multicast communications , 1999, IEEE Network.

[17]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[18]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[19]  Ahmet M. Eskicioglu,et al.  MULTICAST SECURITY USING KEY GRAPHS AND SECRET SHARING , 2002 .

[20]  Colin Perkins,et al.  Watercasting: Distributed Watermarking of Multicast Media , 1999, Networked Group Communication.

[21]  Gustavus J. Simmons,et al.  Prepositioned Shared Secret and/or Shared Control Schemes , 1990, EUROCRYPT.

[22]  Danilo Bruschi,et al.  Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues , 2002, Mob. Networks Appl..

[23]  Edward J. Delp,et al.  Temporal synchronization in video watermarking: further studies , 2003, IS&T/SPIE Electronic Imaging.

[25]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .