Special Issue of International Journal of Computer Applications (0975 -8887) 3rd International IT Summit Confluence 2012 -The Next Generation Information Technology Summit 6 (original) (raw)

A Survey on Multimedia Content Protection

To provide rich media services, multimedia computing has emerged as a noteworthy technology to generate, edit, and search media contents, such as images, graphics, video, audio, and so on. Due to tremendous evolution in Internet technologies and multimedia, content copying has become quite effortless. This paper reviews brief literature on multimedia data security over the cloud and multimedia content protection in terms of copy detection.

Problems and Challenges in Multimedia Networking and Content Protection

2000

The digital networked environment necessitates the development of protection techniquesfor multimedia product access and distribution. This paper refers to protectionschemes for copyright and content originality of multimedia products through invisiblewatermarking. In particular, we present the basic protection schemes and fundamentalconcepts. The elementary partial algorithms, which can consist an overal watermarkingsystem, are given and their basic characteristics are studied. Efficient...

A Survey on Multimedia Content Protection Mechanisms

International Journal of Electrical and Computer Engineering (IJECE), 2018

Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.

IJERT-Multimedia Security

International Journal of Engineering Research and Technology (IJERT), 2013

https://www.ijert.org/multimedia-security https://www.ijert.org/research/multimedia-security-IJERTV2IS90517.pdf Multimedia encryption is widely used to ensure security in open networks such as the internet. Each type of data has its own features; therefore, different techniques should be used to protect confidential data from unauthorized access. Most of the available encryption algorithms are used for text data. However, due to large data size and real time constrains, algorithms that are good for textual data may not be suitable for multimedia data like images, audio and video. This paper aims at implementing and analysing secure encryption algorithms (scrambling, key based pixel manipulation, random mapping, and encryption using random sequences) for multimedia content files. It compares the various parameters such as time taken, entropy, mean square error and also its histograms for these algorithms.

Recent Advances in Multimedia Information System Security

Informatica (slovenia), 2009

A multimedia communication system enables multimedia data 's generation, storage, management, distribution, receiving, consuming, editing, sharing, and so on. In such systems, there are various security issues, which must be considered such as eavesdropping, intrusion, forgery, piracy and privacy, etc. Until now, various security solutions for multimedia communication systems have been reported, while few works have surveyed the latest research advances. This paper gives a thorough review to multimedia information system security. It introduces a general architecture of multimedia information system, and investigates some security issues in multimedia information systems. It reviews the latest security solutions such as Digital Rights Management (DRM), confidentiality protection, ownership protection, traitor tracing, secure multimedia distribution based on watermarking, forgery detection, copy detection, privacy-preserving data mining, secure user interface, intrusion detection and prevention. Moreover, the paper presents some hot research topics such as Trusted Computing, steganography, security in network or service convergence, security of content sharing in social networks, privacy-preserving data processing, multimedia forensics and intelligent surveillance in multimedia information system security. It is expected to benefit readers by providing the latest research progress, advising some research directions and giving a list of references about multimedia system security.

Multimedia Security and Digital Rights Management Technology

Information Security Policies and Actions in Modern Integrated Systems

Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the pervasiveness of XML as a data interchange format has given origin to a number of standard formats for multimedia, such as SMIL for multimedia presentations, SVG for vector graphics, VoiceXML for dialog, and MPEG-21 and MPEG-7 for video. Innovative programming paradigms (such as the one of web services) rely on the availability of XML-based markup and metadata in the multimedia flow in order to customize and add value to multimedia content distributed via the Net. In such a context, a number of This chapter appears in the book, Information Security Policies and Actions in Modern Integrated Systems, edited by Mariagrazia Fugini and Carlo Bellettini.

An overview of multimedia content protection in consumer electronics devices

Signal Processing: Image Communication, 2001

A digital home network is a cluster of digital audio/visual (A/V) devices including set-top boxes, TVs, VCRs, DVD players, and general-purpose computing devices such as personal computers. The network may receive copyrighted digital multimedia content from a number of sources. This content may be broadcast via satellite or terrestrial systems, transmitted by cable operators, or made available as prepackaged media (e.g., a digital tape or a digital video disc). Before releasing their content for distribution, the content owners may require protection by specifying access conditions. Once the content is delivered to the consumer, it moves across home the network until it reaches its destination where it is stored or displayed. A copy protection system is needed to prevent unauthorized access to bit streams in transmission from one A/V device to another or while it is in storage on magnetic or optical media. Recently, two fundamental groups of technologies, encryption and watermarking, have been identified for protecting copyrighted digital multimedia content. This paper is an overview of the work done for protecting content owners' investment in intellectual property.

Multimedia Information Security

Information Encryption and Cyphering

Information security has traditionally been ensured with data encryption techniques. Different generic data encryption standards, such as DES, RSA, AES, have been developed. These encryption standards provide high level of security to the encrypted data. However, they are not very efficient in the encryption of multimedia contents due to the large volume of digital image/video data. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compressionencryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hiding techniques to enhance the security level of data encryption methodologies. Information hiding conceals not only the content of the secret message, but also its very existence. In terms of the amount of data to be embedded, information hiding methodologies can be classified into low bitrate and high bitrate algorithms. In terms of the domain for embedding, they can be classified into spatial domain and transform domain algorithms. In this chapter, we have reviewed various data encryption standards, image/video encryption algorithms, and joint compression-encryption methodologies. Besides, we have also presented different categories of information hiding methodologies as well as data embedding strategies for digital image/video contents. This chapter is organized as following: in Section-1, we give a brief introduction to data encryption system as well as the state-of-the-art encryption standards; Section-2 presents a review of representative image encryption algorithms; Section-3

Content Protection: From Past to Future

2007

Since about twenty years, the value of audiovisual contents continuously increased. Digitalization of contents has simplified and empowered the creative process, has multiplied the number of delivery channels, and made easier the consumption of contents. Digital contents are easier to distribut e. Digital contents are easier to consume. Digital contents are easier to copy. All these factors favoured the hackers.