Multimedia Content Encryption: Techniques And Applications

Overview

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distribution. Multimedia Content Encryption: Techniques and Applications presents the latest research results in this dynamic field.

The book ...

See more details below
Hardcover
$110.28
BN.com price
(Save 12%)$125.95 List Price
Other sellers (Hardcover)
  • All (6) from $108.74   
  • New (4) from $108.74   
  • Used (2) from $148.82   
Sending request ...

Overview

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distribution. Multimedia Content Encryption: Techniques and Applications presents the latest research results in this dynamic field.

The book begins with the history of multimedia encryption and then examines general performance requirements of encryption and fundamental encrypting techniques. It discusses common techniques of complete, partial, and compression-combined encryption; as well as the more specialized forms, including perception, scalable, and commutative encryption. In addition, the author reviews watermarking and joint fingerprint embedding and decryption. Later chapters discuss typical attacks on multimedia encryption, as well as the principles for designing secure algorithms and various applications. An exploration of open issues, up-and-coming topics, and areas for further research rounds out the coverage.

Shiguo Lian is the author or co-author of more than fifty peer-reviewed journal and conference articles covering topics of network security and multimedia content protection, including cryptography, secure P2P content sharing, digital rights management (DRM), encryption, watermarking, digital fingerprinting, and authentication. By following the techniques outlined in this book, users will be better able to protect the integrity of their multimedia data and develop greater confidence that their data will not be misappropriated.

Read More Show Less

Product Details

  • ISBN-13: 9781420065275
  • Publisher: Taylor & Francis
  • Publication date: 9/11/2008
  • Pages: 224
  • Product dimensions: 0.61 (w) x 0.92 (h) x 0.80 (d)

Table of Contents

Introduction
Background
Definition
History
Classification
Book Organization
References
Performance Requirement of Multimedia Content Encryption
Introduction
Security Requirement
Cryptographic Security
Key Sensitivity
Plaintext Sensitivity
Ciphertext Randomness
Perceptual Security
Subjective Metric
Objective Metric
Security Level
Compression Efficiency
Encryption Efficiency
Format Compliance
Application Suitability
Summary
References
Fundamental Techniques
Introduction
Cryptography
Cipher
Symmetric Cipher or Asymmetric Cipher
Block Cipher or Stream Cipher
Encryption Mode of Block Cipher
ECB Mode
CBC Mode
CFB Mode
OFB Mode
CTR Mode
Cryptanalysis
Multimedia Compression
Audio Compression
Image Compression
Video Compression
Scalable Coding
Multimedia Communication
Transmission Network
Application Scenarios
Digital Watermarking
Summary
References
Complete Encryption
Definition of Complete Encryption
Classification of Complete Encryption
Encryption Algorithms for Raw Data or Compressed Data
Raw Data Encryption
Compressed Data Encryption
Typical Encryption Algorithms
Permutation
Random Pixel Permutation
Random Line Permutation
Chaotic Map-Based Permutation
Random Modulation
Confusion-Diffusion Algorithm
Partial DES
Security and Efficiency
Hardware Implementation
Lightweight Encryption
Performance Comparison
Summary
References
Partial Encryption
Definition of Partial Encryption
Data Partitioning
Part Selection
Classification of Partial Encryption
Partial Image Encryption
Raw Image Encryption
Partial Image Encryption during Compression
Partial Encryption in Run-Length Coding
Partial Encryption in Wavelet-Based Codec
Partial Encryption of the Compressed Image
Partial Audio Encryption
Partial Video Encryption
Encryption after Compression
Encryption during Compression
MPEG2 Video Encryption
MPEG4 AVC/H.264 Video Encryption
Performance Comparison
Summary
References
Compression-Combined Encryption
Definition of Compression-Combined Encryption
Secure Huffman Coding Based on Random Huffman-Tree
Permutation
Secure Arithmetic Coding Based on Interval Permutation
Secure Coding Based on Index Encryption
Secure Fixed-Length Coding (FLC) Based on Index
Encryption
Secure Variable-Length Coding (VLC) Based on Index
Encryption
Secure Coding Based on Exp-Golomb Code
Secure Coding Based on Huffman Code
Random Coefficient Scanning
Random Scanning in Wavelet Domain
Random Scanning in DCT Domain
Performance Comparison
Summary
References
Perceptual Encryption
Definition of Perceptual Encryption
Perceptual Encryption Based on Bit-Plane Selection
Bit-Plane Encryption in the Spatial Domain
Bit-Plane Encryption in the DCT Domain
Bit-Plane Encryption in the Wavelet Domain
Perceptual Encryption Based on Frequency Band Selection
Frequency Band Encryption in a DCT Block
Frequency Band Encryption in the Wavelet Domain
Performance Comparison
Summary
References
Scalable Encryption
Definition of Scalable Encryption
Scalable Media Coding
Layered Coding
Layered and Progressive Coding
Progressive Coding
Scalable Coding
Scalable Encryption Algorithms
Scalable Encryption for Layered Coding
Scalable Encryption for Layered and Progressive Coding
Scalable Encryption for Progressive Coding
Scalable Encryption for Scalable Coding
Performance Comparison
Summary
References
Commutative Watermarking and Encryption
Definition of Commutative Watermarking and Encryption
CWE Based on Partial Encryption
The General Architecture
The Improved Scheme
Selection of the Encryption Part and Watermarking Part
CWE Based on Homomorphic Operations
The CWE Scheme Based on XOR Operation
The CWE Scheme Based on Module Addition
Performance Comparison
Summary
References
Joint Fingerprint Embedding and Decryption
Definition of Joint Fingerprint Embedding and Decryption
Typical JFD Schemes
The JFD Scheme Based on Broadcast Encryption
The JFD Scheme Based on Codeword Modification
The JFD Scheme Based on Partial Decryption
The JFD Scheme Based on Index Modification
The JFD Scheme Based on Homomorphic Operations
Performance Comparison
Summary
References
Typical Attacks on Multimedia Encryption
Security Requirement of Multimedia Encryption
Cryptographic Attacks
Flaws in Perceptual Security
Level Encryption in Run-Level Coding
Statistical Model-Based Attack on Sign Encryption
Replacement Attack
Replacement Attack on Bit-Plane Encryption
Replacement Attack on Frequency Band Encryption
Replacement Attack on Intra-Prediction Mode
Encryption
Summary
References
Some Principles for Secure Multimedia Encryption
Shannon’s Information Theory of Secrecy System
Principles for Secure Complete Encryption
General Models of Complete Encryption
Encryption Before or After Compression
Example of Secure Complete Encryption
Random Packet Partitioning
Packet Encryption
Decryption
Encryption Efficiency
Principles for Secure Partial Encryption
Model of Partial Encryption
Principles for Secure Encryption
Cryptographic Security
Parameter Independence
Perceptual Security
Summary of the Principles and Means
Example Based on JPEG2000 Image Encryption
Parameter Sensitivity
Parameter Independence
Selection of the Cipher
The Partial Encryption Scheme
Performance Evaluation
Principles for Secure Compression-Combined Encryption
Model of Compression-Combined Encryption Scheme
Relation between Compression Ratio and Security
Equivalent Compression-Encryption Independent Scheme
Analysis on Existing Compression-Combined
Encryption Schemes
Tradeoff between Compression Ratio and Security
The Equivalent Compression-Encryption Independent Scheme
Summary
References
Multimedia Encryption in Typical Applications
Secure Media Player
Secure Media Streaming
Secure Media Preview
Secure Media Transcoding
Secure Media Distribution
Digital Rights Management
References
Open Issues
Perceptual Security
Lightweight Implementation
Contradiction between Format Compliance and Upgrade
Ability to Support Direct Operations
Key Management
Combination between Encryption and Other Means
Summary

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)