Multimedia Security Technologies for Digital Rights Management

Multimedia Security Technologies for Digital Rights Management

von: Wenjun Zeng, Heather Yu, Ching-Yung Lin (Eds.)

Elsevier Trade Monographs, 2006

ISBN: 9780080463896 , 520 Seiten

Format: PDF

Kopierschutz: DRM

Windows PC,Mac OSX Apple iPad, Android Tablet PC's

Preis: 80,95 EUR

Mehr zum Inhalt

Multimedia Security Technologies for Digital Rights Management


 

Front Cover

1

Table of Contents

7

PREFACE

21

Part A - OVERVIEW

25

Chapter 1 - Introduction—Digital Rights Management

27

1.1 PROPERTY AND VALUE

27

1.2 “ORIGINALWORK”

28

1.3 LOOKING BACK AT THE COPYRIGHT ACT OF 1976

29

1.4 COMMUNICATION THEORY—WHO SCREAMS LOUDEST?

33

1.5 CRYPTOGRAPHY—MUCH TO DO

38

1.6 DIGITAL RIGHTS MANAGEMENT—WRAPPING AND EMBEDDING

39

1.7 NOW, THE FUTURE

45

ACKNOWLEDGMENTS

46

REFERENCES

46

Chapter 2 - Digital Rights Management Systems

47

2.1 INTRODUCTION—WHAT IS DIGITAL RIGHTS MANAGEMENT?

47

2.2 THE BASIC STRUCTURE OF A DRM SYSTEM

48

2.3 EXAMPLE: THE DVD CONTENT SCRAMBLING SYSTEM

50

2.4 EXAMPLE: THE OMA DRM

52

2.5 THE MPEG LA® DRM REFERENCE MODEL

56

2.6 MAPPING AN APPLICATION ONTO THE MPEG LA® DRM RM

67

2.7 CONCLUSION

70

REFERENCES

73

Chapter 3 - Putting Digital Rights Management In Context

75

3.1 INTRODUCTION

75

3.2 VALUE-CHAINS

76

3.3 DIGITAL TECHNOLOGIES

78

3.4 WORKING WITH DIGITAL MEDIA

79

3.5 DIGITAL RIGHTS MANAGEMENT

80

3.6 MAKING DRM INTEROPERABLE

81

3.7 THE DMP RESULTS SO FAR

83

3.8 THE DMP SPECIFICATIONS PHASE I

84

3.9 BEYOND TECHNICAL SPECIFICATIONS

90

3.10 ADAPTING TO THE NEW ENVIRONMENT

91

3.11 INTEROPERABLE DRM PLATFORM, PHASE II

94

3.12 CONCLUSION

94

REFERENCES

95

Part B - FUNDAMENTALS OF MULTIMEDIA SECURITY

97

Chapter 4 - Multimedia Encryption

99

4.1 INTRODUCTION

99

4.2 FUNDAMENTALS OF MODERN ENCRYPTION

100

4.3 THE MULTIMEDIA ENCRYPTION PARADIGM

104

4.4 MULTIMEDIA ENCRYPTION SCHEMES

110

4.5 CONCLUSION

127

REFERENCES

127

Chapter 5 - Multimedia Authentication

135

5.1 INTRODUCTION

135

5.2 IMAGE AUTHENTICATION

147

5.3 VIDEO AUTHENTICATION

150

5.4 AUDIO AUTHENTICATION

157

5.5 SUMMARY

159

REFERENCES

159

Chapter 6 - Key Management for Multimedia Access and Distribution

163

6.1 INTRODUCTION

163

6.2 SECURITY OF MULTIMEDIA IN DISTRIBUTION

166

6.3 SUMMARY OF CA, DRM, AND CP SYSTEMS

186

REFERENCES

188

Chapter 7 An Overview of Digital Watermarking

191

7.1 INTRODUCTION

191

7.2 CLASSIFICATION OFWATERMARKING SCHEMES

193

7.3 TOOLS AND MATHEMATICAL BACKGROUND

195

7.4 DATA HIDING WITH SIDE INFORMATION

200

7.5 QUANTIZATION-BASED DATA HIDING

203

7.6 LOSSLESSWATERMARKING

208

7.7 FREQUENCY DOMAINWATERMARKING

209

7.8 SECURITY AND ROBUSTNESS

212

7.9 SUMMARY

214

REFERENCES

214

Chapter 8 - Biometrics in Digital Rights Management

221

8.1 INTRODUCTION

221

8.2 BIOMETRICS

223

8.3 INTEGRATING BIOMETRICS WITH DRM SYSTEMS

231

8.4 CONCLUSION

239

REFERENCES

240

Part C - ADVANCED TOPICS

243

Chapter 9 - Format-Compliant Content Protection

245

9.1 INTRODUCTION

245

9.2 SECURITY ARCHITECTURES FOR CONTENT PROTECTION

247

9.3 RATIONALES FOR FORMAT-COMPLIANT CONTENT PROTECTION

250

9.4 FORMAT-COMPLIANT CONTENT ENCRYPTION

253

9.5 FORMAT-AGNOSTIC CONTENT PROTECTION

259

9.6 SEMI-FORMAT-COMPLIANT CONTENT PROTECTION

260

9.7 CONCLUSION

261

REFERENCES

262

Chapter 10 - Secure Media Streaming and Secure Transcoding

265

10.1 INTRODUCTION

265

10.2 SECURE STREAMING AND SECURE TRANSCODING FOR SCALABLE CODERS

271

10.3 SECURE STREAMING AND ADAPTATION FOR NON-SCALABLE CODERS

280

10.4 SECURE MEDIA SYSTEMS

286

10.5 SUMMARY

295

REFERENCES

296

Chapter 11 - Scalable Encryption and Multi- Access Control for Multimedia

299

11.1 INTRODUCTION

299

11.2 SCALABLE CODING

302

11.3 SCALABLE ENCRYPTION

305

11.4 MULTI-ACCESS ENCRYPTION AND KEY SCHEMES

312

11.5 CONCLUSION

322

REFERENCES

323

Chapter 12 - Broadcast Encryption

327

12.1 INTRODUCTION

327

12.2 PUBLIC KEY CRYPTOGRAPHY VERSUS BROADCAST ENCRYPTION

329

12.3 A TUTORIAL EXAMPLE

330

12.4 SOME PRACTICAL SYSTEMS

331

12.5 SOME EXTENSIONS TO BROADCAST ENCRYPTION

343

12.6 CONCLUSION

345

REFERENCES

346

Chapter 13 - Practical “Traitor Tracing”

347

13.1 INTRODUCTION

347

13.2 PROBLEM: OVERHEAD

350

13.3 PROBLEM: INEFFICIENT TRACING

353

13.4 PROBLEM: REDUCE THE NUMBER OF KEYS STORED IN THE DEVICE

358

13.5 PROBLEM: LACK OF FLEXIBILITY

359

13.6 PROBLEM: TRACING TO MODELS INSTEAD OF TO INDIVIDUAL DEVICES

360

13.7 PROBLEM: EVIL MANUFACTURERS

365

13.8 PROBLEM: WHAT TO DO AFTER YOU TRACE

366

13.9 PROBLEM: WHEN TO APPLY THE TRACING TECHNOLOGY

368

13.10 CONCLUSION

369

REFERENCES

370

Chapter 14 - Steganalysis

373

14.1 BASIC CONCEPTS

373

14.2 STEGANOGRAPHY—HISTORICAL PERSPECTIVE

376

14.3 TARGETED STEGANALYSIS

379

14.4 BLIND STEGANALYSIS

388

14.5 THE FUTURE

398

REFERENCES

400

Chapter 15 - Passive-blind Image Forensics

407

15.1 INTRODUCTION

407

15.2 OVERVIEW OF PBIF

409

15.3 FORGERY DETECTION AND SOURCE IDENTIFICATION

410

15.4 CHALLENGES AND RESOURCES FOR PBIF

424

15.5 SUMMARY AND CONCLUSION

430

15.6 FORGERY CREATION TECHNIQUES

430

REFERENCES

433

Chapter 16 - Security in Digital Cinema

437

16.1 INTRODUCTION

437

16.2 DIGITAL CINEMA STANDARDIZATION EFFORTS

438

16.3 GOALS OF THE DIGITAL CINEMA SECURITY SYSTEM

440

16.4 TOOLS OF DIGITAL CINEMA CONTENT SECURITY

441

16.5 DCI DIGITAL CINEMA SPECIFICATION

445

16.6 SUMMARY

454

REFERENCES

455

Part D - STANDARDS AND LEGAL ISSUES

457

Chapter 17 - DRM Standard Activities

459

17.1 INTRODUCTION

459

17.2 MPEG

460

17.3 OMA

470

17.4 CORAL

473

17.5 DMP

474

17.6 ISMA

475

17.7 AACS

476

17.8 LIST OF DRM STANDARD ORGANIZATIONS AND CONSORTIUMS

477

REFERENCES

479

Chapter 18 - The Digital Millennium Copyright Act

481

18.1 DIGITAL MEDIA AND SIX-TOED CATS

481

18.2 SPECIAL INTEREST GROUPS, A TREATY, AND THE DIGITAL MILLENNIUM COPYRIGHT ACT IS BORN

482

18.3 THE DIGITAL MILLENNIUM COPYRIGHT ACT IN A NUTSHELL

484

18.4 CIRCUMVENTING A TECHNOLOGICAL MEASURE—A DMCA VIOLATION OF THE FIRST KIND

485

18.5 OVERSEEING THE PROCESS SHALL BE TWO COMPETING GOVERNMENT AGENCIES

489

18.6 LOOPHOLES ONLY A LAWYER COULD LOVE

490

18.7 A COLLECTION OF SAFETY VALVES

496

18.8 A CHILLING EFFECT UPON REVERSE ENGINEERING

499

18.9 REMOVING COPYRIGHT MANAGEMENT INFORMATION—A DMCA VIOLATION OF THE SECOND KIND

502

18.10 MORE LOOPHOLES

503

18.11 CONCLUSION—THE SIX-TOED CATS ARE PROBABLY WINNING

505

INDEX

507