Suchen und Finden
Front Cover
1
Table of Contents
7
PREFACE
21
Part A - OVERVIEW
25
Chapter 1 - Introduction—Digital Rights Management
27
1.1 PROPERTY AND VALUE
27
1.2 “ORIGINALWORK”
28
1.3 LOOKING BACK AT THE COPYRIGHT ACT OF 1976
29
1.4 COMMUNICATION THEORY—WHO SCREAMS LOUDEST?
33
1.5 CRYPTOGRAPHY—MUCH TO DO
38
1.6 DIGITAL RIGHTS MANAGEMENT—WRAPPING AND EMBEDDING
39
1.7 NOW, THE FUTURE
45
ACKNOWLEDGMENTS
46
REFERENCES
46
Chapter 2 - Digital Rights Management Systems
47
2.1 INTRODUCTION—WHAT IS DIGITAL RIGHTS MANAGEMENT?
47
2.2 THE BASIC STRUCTURE OF A DRM SYSTEM
48
2.3 EXAMPLE: THE DVD CONTENT SCRAMBLING SYSTEM
50
2.4 EXAMPLE: THE OMA DRM
52
2.5 THE MPEG LA® DRM REFERENCE MODEL
56
2.6 MAPPING AN APPLICATION ONTO THE MPEG LA® DRM RM
67
2.7 CONCLUSION
70
REFERENCES
73
Chapter 3 - Putting Digital Rights Management In Context
75
3.1 INTRODUCTION
75
3.2 VALUE-CHAINS
76
3.3 DIGITAL TECHNOLOGIES
78
3.4 WORKING WITH DIGITAL MEDIA
79
3.5 DIGITAL RIGHTS MANAGEMENT
80
3.6 MAKING DRM INTEROPERABLE
81
3.7 THE DMP RESULTS SO FAR
83
3.8 THE DMP SPECIFICATIONS PHASE I
84
3.9 BEYOND TECHNICAL SPECIFICATIONS
90
3.10 ADAPTING TO THE NEW ENVIRONMENT
91
3.11 INTEROPERABLE DRM PLATFORM, PHASE II
94
3.12 CONCLUSION
94
REFERENCES
95
Part B - FUNDAMENTALS OF MULTIMEDIA SECURITY
97
Chapter 4 - Multimedia Encryption
99
4.1 INTRODUCTION
99
4.2 FUNDAMENTALS OF MODERN ENCRYPTION
100
4.3 THE MULTIMEDIA ENCRYPTION PARADIGM
104
4.4 MULTIMEDIA ENCRYPTION SCHEMES
110
4.5 CONCLUSION
127
REFERENCES
127
Chapter 5 - Multimedia Authentication
135
5.1 INTRODUCTION
135
5.2 IMAGE AUTHENTICATION
147
5.3 VIDEO AUTHENTICATION
150
5.4 AUDIO AUTHENTICATION
157
5.5 SUMMARY
159
REFERENCES
159
Chapter 6 - Key Management for Multimedia Access and Distribution
163
6.1 INTRODUCTION
163
6.2 SECURITY OF MULTIMEDIA IN DISTRIBUTION
166
6.3 SUMMARY OF CA, DRM, AND CP SYSTEMS
186
REFERENCES
188
Chapter 7 An Overview of Digital Watermarking
191
7.1 INTRODUCTION
191
7.2 CLASSIFICATION OFWATERMARKING SCHEMES
193
7.3 TOOLS AND MATHEMATICAL BACKGROUND
195
7.4 DATA HIDING WITH SIDE INFORMATION
200
7.5 QUANTIZATION-BASED DATA HIDING
203
7.6 LOSSLESSWATERMARKING
208
7.7 FREQUENCY DOMAINWATERMARKING
209
7.8 SECURITY AND ROBUSTNESS
212
7.9 SUMMARY
214
REFERENCES
214
Chapter 8 - Biometrics in Digital Rights Management
221
8.1 INTRODUCTION
221
8.2 BIOMETRICS
223
8.3 INTEGRATING BIOMETRICS WITH DRM SYSTEMS
231
8.4 CONCLUSION
239
REFERENCES
240
Part C - ADVANCED TOPICS
243
Chapter 9 - Format-Compliant Content Protection
245
9.1 INTRODUCTION
245
9.2 SECURITY ARCHITECTURES FOR CONTENT PROTECTION
247
9.3 RATIONALES FOR FORMAT-COMPLIANT CONTENT PROTECTION
250
9.4 FORMAT-COMPLIANT CONTENT ENCRYPTION
253
9.5 FORMAT-AGNOSTIC CONTENT PROTECTION
259
9.6 SEMI-FORMAT-COMPLIANT CONTENT PROTECTION
260
9.7 CONCLUSION
261
REFERENCES
262
Chapter 10 - Secure Media Streaming and Secure Transcoding
265
10.1 INTRODUCTION
265
10.2 SECURE STREAMING AND SECURE TRANSCODING FOR SCALABLE CODERS
271
10.3 SECURE STREAMING AND ADAPTATION FOR NON-SCALABLE CODERS
280
10.4 SECURE MEDIA SYSTEMS
286
10.5 SUMMARY
295
REFERENCES
296
Chapter 11 - Scalable Encryption and Multi- Access Control for Multimedia
299
11.1 INTRODUCTION
299
11.2 SCALABLE CODING
302
11.3 SCALABLE ENCRYPTION
305
11.4 MULTI-ACCESS ENCRYPTION AND KEY SCHEMES
312
11.5 CONCLUSION
322
REFERENCES
323
Chapter 12 - Broadcast Encryption
327
12.1 INTRODUCTION
327
12.2 PUBLIC KEY CRYPTOGRAPHY VERSUS BROADCAST ENCRYPTION
329
12.3 A TUTORIAL EXAMPLE
330
12.4 SOME PRACTICAL SYSTEMS
331
12.5 SOME EXTENSIONS TO BROADCAST ENCRYPTION
343
12.6 CONCLUSION
345
REFERENCES
346
Chapter 13 - Practical “Traitor Tracing”
347
13.1 INTRODUCTION
347
13.2 PROBLEM: OVERHEAD
350
13.3 PROBLEM: INEFFICIENT TRACING
353
13.4 PROBLEM: REDUCE THE NUMBER OF KEYS STORED IN THE DEVICE
358
13.5 PROBLEM: LACK OF FLEXIBILITY
359
13.6 PROBLEM: TRACING TO MODELS INSTEAD OF TO INDIVIDUAL DEVICES
360
13.7 PROBLEM: EVIL MANUFACTURERS
365
13.8 PROBLEM: WHAT TO DO AFTER YOU TRACE
366
13.9 PROBLEM: WHEN TO APPLY THE TRACING TECHNOLOGY
368
13.10 CONCLUSION
369
REFERENCES
370
Chapter 14 - Steganalysis
373
14.1 BASIC CONCEPTS
373
14.2 STEGANOGRAPHY—HISTORICAL PERSPECTIVE
376
14.3 TARGETED STEGANALYSIS
379
14.4 BLIND STEGANALYSIS
388
14.5 THE FUTURE
398
REFERENCES
400
Chapter 15 - Passive-blind Image Forensics
407
15.1 INTRODUCTION
407
15.2 OVERVIEW OF PBIF
409
15.3 FORGERY DETECTION AND SOURCE IDENTIFICATION
410
15.4 CHALLENGES AND RESOURCES FOR PBIF
424
15.5 SUMMARY AND CONCLUSION
430
15.6 FORGERY CREATION TECHNIQUES
430
REFERENCES
433
Chapter 16 - Security in Digital Cinema
437
16.1 INTRODUCTION
437
16.2 DIGITAL CINEMA STANDARDIZATION EFFORTS
438
16.3 GOALS OF THE DIGITAL CINEMA SECURITY SYSTEM
440
16.4 TOOLS OF DIGITAL CINEMA CONTENT SECURITY
441
16.5 DCI DIGITAL CINEMA SPECIFICATION
445
16.6 SUMMARY
454
REFERENCES
455
Part D - STANDARDS AND LEGAL ISSUES
457
Chapter 17 - DRM Standard Activities
459
17.1 INTRODUCTION
459
17.2 MPEG
460
17.3 OMA
470
17.4 CORAL
473
17.5 DMP
474
17.6 ISMA
475
17.7 AACS
476
17.8 LIST OF DRM STANDARD ORGANIZATIONS AND CONSORTIUMS
477
REFERENCES
479
Chapter 18 - The Digital Millennium Copyright Act
481
18.1 DIGITAL MEDIA AND SIX-TOED CATS
481
18.2 SPECIAL INTEREST GROUPS, A TREATY, AND THE DIGITAL MILLENNIUM COPYRIGHT ACT IS BORN
482
18.3 THE DIGITAL MILLENNIUM COPYRIGHT ACT IN A NUTSHELL
484
18.4 CIRCUMVENTING A TECHNOLOGICAL MEASURE—A DMCA VIOLATION OF THE FIRST KIND
485
18.5 OVERSEEING THE PROCESS SHALL BE TWO COMPETING GOVERNMENT AGENCIES
489
18.6 LOOPHOLES ONLY A LAWYER COULD LOVE
490
18.7 A COLLECTION OF SAFETY VALVES
496
18.8 A CHILLING EFFECT UPON REVERSE ENGINEERING
499
18.9 REMOVING COPYRIGHT MANAGEMENT INFORMATION—A DMCA VIOLATION OF THE SECOND KIND
502
18.10 MORE LOOPHOLES
503
18.11 CONCLUSION—THE SIX-TOED CATS ARE PROBABLY WINNING
505
INDEX
507
Alle Preise verstehen sich inklusive der gesetzlichen MwSt.