Lightweight secure multimedia distribution based on homomorphic operations

被引:8
作者
Lian, Shiguo [1 ]
Chen, Xi [2 ]
机构
[1] France Telecom R&D Orange Labs Beijing, Beijing 100080, Peoples R China
[2] Nanjing Univ, E Commerce Dept, Sch Management, Nanjing 210093, Jiangsu, Peoples R China
关键词
Multimedia distribution; Digital fingerprinting; Encryption; Multimedia security; Watermarking; Digital rights management; ENCRYPTION;
D O I
10.1007/s11235-010-9367-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A secure media distribution scheme is proposed in this paper, which distributes different media copy to different customer in a secure and efficient manner and is able to trace illegal redistribution. At the sender side, media data are scrambled with a random sequence under the control of a secret key. At the receiver side, the scrambled media data are descrambled with a new random sequence under the control of a unique customer code besides the secret key. The scrambling and descrambling strength can be adjusted by the parameter named quantization factor. Generally, the bigger factor is used in scrambling and the smaller one is used in descrambling. After descrambling, the recovered media copy that contains a unique customer sequence, named fingerprint, is slightly different from the original one. This difference is imperceptible to human eyes, while can be detected by computers and used to trace the redistribution of the media copy. Additionally, the unique customer sequence is produced by the collusion-resistant code, which can survive the attacks that combine several copies by averaging. The scheme's performances, including security, imperceptibility, robustness and efficiency, are analyzed and tested in detail. Its good performances make it a suitable choice for lightweight secure multimedia distribution, such as music download, image sharing, live TV or video-on-demand, etc., especially over Mobile terminals.
引用
收藏
页码:187 / 197
页数:11
相关论文
共 34 条
  • [1] AACS, ADV ACC CONTR SYST A
  • [2] Anderson R, 1997, LECT NOTES COMPUT SC, V1267, P107
  • [3] Bloom JA, 2003, INT CONF ACOUST SPEE, P712
  • [4] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
  • [5] Brown I., 1999, LECT NOTES COMPUTER, V2052, P1735
  • [6] Collusion-resilient fingerprinting by random pre-warping
    Celik, MU
    Sharma, G
    Tekalp, AM
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2004, 11 (10) : 831 - 835
  • [7] Cox I. J., 2002, Digital watermarking, V53
  • [8] Dinitz J. H., 1992, CONT DESIGN THEORY C
  • [9] Experimental measurements and design guidelines for real-time software encryption in multimedia wireless LANs
    Aura Ganz
    Se Hyun Park
    Zvi Ganz
    [J]. Cluster Computing, 1999, 2 (1) : 35 - 43
  • [10] Ganz A., 1998, IEEE MIL COMM C OCT