Multimedia Security: Encryption, Watermarking, and Distribution Technologies and Applications

Abstract

With the development progress of wireless communications and networking technologies, the transmission opportunities of multimedia data become increasing. Because of the planarity and diversity of multimedia, and the increasing rate of wireless network popularity, the sharing and exchanging actions among different users are common. However, during the transmission process, if the multimedia data is not properly protected, i.e. if the multimedia security technologies are not properly developed, multimedia content would be accessed and shared without any limitation, forcing the copyright of the multimedia content owner. In this dissertation, the multimedia applications and technologies would be widely discussed, especially multimedia encryption, watermarking, and distribution applications and technologies. In this dissertation, the recent most challenging problems in multimedia security would be addressed, discussed, and properly dealt with.

In this dissertation, the multimedia security issue is discussed from the first defense line: multimedia encryption. Because the protected encrypted multimedia data would be distributed over the error-prone network environment, a media-hash based video error resilient technique is proposed. Next, the second defense line, multimedia watermarking, is addressed. A robust image watermarking technique against geometric distortions and watermark estimation attack (WEA) is proposed. In addition, a temporal re-synchronization technique for video watermarking is discussed to improve the robustness. While the two defense lines for multimedia security are well-developed, a proper secure multimedia distribution framework is necessary. An advanced access control system (AACS)-compatible joint encryption and fingerprinting technique is proposed to form a proper framework. Some security issues, challenges, and solutions are addressed.

Media encryption technologies actively play the first line of defense in securing the access of multimedia data. Traditional cryptographic encryption can achieve provable security but is unfortunately sensitive to a single bit error, which will cause an unreliable packet to be dropped creating packet loss. In order to achieve robust media encryption, the requirement of error resilience can be achieved with error-resilient media transmission. This dissertation proposes a video joint encryption and transmission (video JET) scheme by exploiting media hash-embedded residual data to achieve motion estimation and compensation for recovering lost packets, while maintaining format compliance and cryptographic provable security. Interestingly, since video block hash preserves the condensed content to facilitate search of similar blocks, motion estimation is implicitly performed through robust media hash matching -- which is the unique characteristic of our method.

The second defense line of multimedia protection is watermarking. The major disadvantage of existing watermarking methods is their limited resistance to extensive geometric attacks. In addition, we have found that the weakness of multiple watermark embedding methods that were initially designed to resist geometric attacks is their inability to withstand the watermark-estimation attacks (WEAs), leading to reduce resistance to geometric attacks. In view of these facts, this dissertation proposes a robust image watermarking scheme that can withstand geometric distortions and WEAs simultaneously. Our scheme is mainly composed of three components: (i) robust mesh generation and mesh-based watermarking to resist geometric distortions; (ii) construction of media hash-based content-dependent watermark (CDW) to resist WEAs; and (iii) a mechanism of false positive-oriented watermark detection, which can be used to determine the existence of a watermark so as to achieve a trade-off between correct detection and false detection.

In addition, synchronization for video watermarking is a challenging problem. We propose a novel temporal synchronization method for video watermarking by matching the profile statistics. The profile statistics, represented by the characteristic parameters such as position mean and variance in x- and y-directions, of a frame in a video sequence can easily be calculated and sent as the side information to the receiver. At the receiving end, temporal attacks such as transposition, dropping, and insertion can be detected by comparing the side information and the characteristic parameters calculated from the received video.

While the two defense lines for multimedia security are well-developed, a proper secure multimedia distribution framework is necessary. In this dissertation, a new multimedia joint encryption and fingerprinting (JEF) scheme embedded into the advanced access control system (AACS) is proposed. AACS is selected because it has been the leading technology in access control developed by many significant companies for multimedia distribution. In this AACS-compatible JEF system, many attack points exist and can be explored to defend it. Furthermore, multiple attack points can form multi-point collusion attacks, which also engage the proposed system. In this paper, (i) we propose multimedia encryption at different points to resist some attacks points; (ii) we propose rewritable fingerprint embedding (RFE) to deal with some multi-point collusion attacks; (iii) we design SPSM to evaluate the degree of security which multiple encryptions are applied.

 

Key words ¾ Multimedia Security, Encryption, Watermarking, Distribution