Multimedia Content Encryption

Multimedia Content Encryption

By: Shiguo Lian (author)Hardback

1 - 2 weeks availability


The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distribution. Multimedia Content Encryption: Techniques and Applications presents the latest research results in this dynamic field. The book begins with the history of multimedia encryption and then examines general performance requirements of encryption and fundamental encrypting techniques. It discusses common techniques of complete, partial, and compression-combined encryption; as well as the more specialized forms, including perception, scalable, and commutative encryption. In addition, the author reviews watermarking and joint fingerprint embedding and decryption. Later chapters discuss typical attacks on multimedia encryption, as well as the principles for designing secure algorithms and various applications. An exploration of open issues, up-and-coming topics, and areas for further research rounds out the coverage. Shiguo Lian is the author or co-author of more than fifty peer-reviewed journal and conference articles covering topics of network security and multimedia content protection, including cryptography, secure P2P content sharing, digital rights management (DRM), encryption, watermarking, digital fingerprinting, and authentication. By following the techniques outlined in this book, users will be better able to protect the integrity of their multimedia data and develop greater confidence that their data will not be misappropriated.

Create a review


Introduction Background Definition History Classification Book Organization References Performance Requirement of Multimedia Content Encryption Introduction Security Requirement Cryptographic Security Key Sensitivity Plaintext Sensitivity Ciphertext Randomness Perceptual Security Subjective Metric Objective Metric Security Level Compression Efficiency Encryption Efficiency Format Compliance Application Suitability Summary References Fundamental Techniques Introduction Cryptography Cipher Symmetric Cipher or Asymmetric Cipher Block Cipher or Stream Cipher Encryption Mode of Block Cipher ECB Mode CBC Mode CFB Mode OFB Mode CTR Mode Cryptanalysis Multimedia Compression Audio Compression Image Compression Video Compression Scalable Coding Multimedia Communication Transmission Network Application Scenarios Digital Watermarking Summary References Complete Encryption Definition of Complete Encryption Classification of Complete Encryption Encryption Algorithms for Raw Data or Compressed Data Raw Data Encryption Compressed Data Encryption Typical Encryption Algorithms Permutation Random Pixel Permutation Random Line Permutation Chaotic Map-Based Permutation Random Modulation Confusion-Diffusion Algorithm Partial DES Security and Efficiency Hardware Implementation Lightweight Encryption Performance Comparison Summary References Partial Encryption Definition of Partial Encryption Data Partitioning Part Selection Classification of Partial Encryption Partial Image Encryption Raw Image Encryption Partial Image Encryption during Compression Partial Encryption in Run-Length Coding Partial Encryption in Wavelet-Based Codec Partial Encryption of the Compressed Image Partial Audio Encryption Partial Video Encryption Encryption after Compression Encryption during Compression MPEG2 Video Encryption MPEG4 AVC/H.264 Video Encryption Performance Comparison Summary References Compression-Combined Encryption Definition of Compression-Combined Encryption Secure Huffman Coding Based on Random Huffman-Tree Permutation Secure Arithmetic Coding Based on Interval Permutation Secure Coding Based on Index Encryption Secure Fixed-Length Coding (FLC) Based on Index Encryption Secure Variable-Length Coding (VLC) Based on Index Encryption Secure Coding Based on Exp-Golomb Code Secure Coding Based on Huffman Code Random Coefficient Scanning Random Scanning in Wavelet Domain Random Scanning in DCT Domain Performance Comparison Summary References Perceptual Encryption Definition of Perceptual Encryption Perceptual Encryption Based on Bit-Plane Selection Bit-Plane Encryption in the Spatial Domain Bit-Plane Encryption in the DCT Domain Bit-Plane Encryption in the Wavelet Domain Perceptual Encryption Based on Frequency Band Selection Frequency Band Encryption in a DCT Block Frequency Band Encryption in the Wavelet Domain Performance Comparison Summary References Scalable Encryption Definition of Scalable Encryption Scalable Media Coding Layered Coding Layered and Progressive Coding Progressive Coding Scalable Coding Scalable Encryption Algorithms Scalable Encryption for Layered Coding Scalable Encryption for Layered and Progressive Coding Scalable Encryption for Progressive Coding Scalable Encryption for Scalable Coding Performance Comparison Summary References Commutative Watermarking and Encryption Definition of Commutative Watermarking and Encryption CWE Based on Partial Encryption The General Architecture The Improved Scheme Selection of the Encryption Part and Watermarking Part CWE Based on Homomorphic Operations The CWE Scheme Based on XOR Operation The CWE Scheme Based on Module Addition Performance Comparison Summary References Joint Fingerprint Embedding and Decryption Definition of Joint Fingerprint Embedding and Decryption Typical JFD Schemes The JFD Scheme Based on Broadcast Encryption The JFD Scheme Based on Codeword Modification The JFD Scheme Based on Partial Decryption The JFD Scheme Based on Index Modification The JFD Scheme Based on Homomorphic Operations Performance Comparison Summary References Typical Attacks on Multimedia Encryption Security Requirement of Multimedia Encryption Cryptographic Attacks Flaws in Perceptual Security Level Encryption in Run-Level Coding Statistical Model-Based Attack on Sign Encryption Replacement Attack Replacement Attack on Bit-Plane Encryption Replacement Attack on Frequency Band Encryption Replacement Attack on Intra-Prediction Mode Encryption Summary References Some Principles for Secure Multimedia Encryption Shannon's Information Theory of Secrecy System Principles for Secure Complete Encryption General Models of Complete Encryption Encryption Before or After Compression Example of Secure Complete Encryption Random Packet Partitioning Packet Encryption Decryption Encryption Efficiency Principles for Secure Partial Encryption Model of Partial Encryption Principles for Secure Encryption Cryptographic Security Parameter Independence Perceptual Security Summary of the Principles and Means Example Based on JPEG2000 Image Encryption Parameter Sensitivity Parameter Independence Selection of the Cipher The Partial Encryption Scheme Performance Evaluation Principles for Secure Compression-Combined Encryption Model of Compression-Combined Encryption Scheme Relation between Compression Ratio and Security Equivalent Compression-Encryption Independent Scheme Analysis on Existing Compression-Combined Encryption Schemes Tradeoff between Compression Ratio and Security The Equivalent Compression-Encryption Independent Scheme Summary References Multimedia Encryption in Typical Applications Secure Media Player Secure Media Streaming Secure Media Preview Secure Media Transcoding Secure Media Distribution Digital Rights Management References Open Issues Perceptual Security Lightweight Implementation Contradiction between Format Compliance and Upgrade Ability to Support Direct Operations Key Management Combination between Encryption and Other Means Summary

Product Details

  • publication date: 12/09/2008
  • ISBN13: 9781420065275
  • Format: Hardback
  • Number Of Pages: 224
  • ID: 9781420065275
  • weight: 544
  • ISBN10: 1420065270

Delivery Information

  • Saver Delivery: Yes
  • 1st Class Delivery: Yes
  • Courier Delivery: Yes
  • Store Delivery: Yes

Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly